Page 5 of 57 results (0.005 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre. Se presenta una vulnerabilidad de deserialización en la forma en que el servicio AosService.rem de Rockwell Automation FactoryTalk AssetCentre versiones v10.00 y anteriores, verifica los datos serializados. Esta vulnerabilidad puede permitir a un atacante remoto no autenticado ejecutar comandos arbitrarios en FactoryTalk AssetCentre • https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831 https://www.cisa.gov/uscert/ics/advisories/icsa-21-091-01 • CWE-502: Deserialization of Untrusted Data •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

The ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements. El servicio ArchiveService.rem de Rockwell Automation FactoryTalk AssetCentre versiones v10.00 y anteriores, expone funciones que carecen de la autenticación apropiada. Esta vulnerabilidad puede permitir a un atacante remoto no autenticado ejecutar sentencias SQL arbitrarias • https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831 https://www.cisa.gov/uscert/ics/advisories/icsa-21-091-01 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endpoints that deserialize untrusted data without sufficiently verifying that the resulting data will be valid. This vulnerability may allow a remote, unauthenticated attacker to gain full access to the FactoryTalk AssetCentre main server and all agent machines. Los componentes de Rockwell Automation FactoryTalk AssetCentre versiones v10.00 y anteriores , contienen endpoints de remoting .NET que deserializan datos no confiables sin verificar suficientemente que los datos resultantes sean válidos. Esta vulnerabilidad puede permitir a un atacante remoto no autenticado obtener acceso completo al servidor principal de FactoryTalk AssetCentre y a todas las máquinas de los agentes • https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831 https://www.cisa.gov/uscert/ics/advisories/icsa-21-091-01 • CWE-502: Deserialization of Untrusted Data •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

Due to usernames/passwords being stored in plaintext in Random Access Memory (RAM), a local, authenticated attacker could gain access to certain credentials, including Windows Logon credentials. Debido a que los nombres de usuario/contraseñas son almacenadas en texto plano en la Memoria de Acceso Aleatorio (RAM), un atacante local y autenticado podría conseguir acceso a determinadas credenciales, incluidas las de inicio de sesión de Windows • https://www.cisa.gov/uscert/ics/advisories/icsa-20-177-03 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

The DeskLock tool provided with FactoryTalk View SE uses a weak encryption algorithm that may allow a local, authenticated attacker to decipher user credentials, including the Windows user or Windows DeskLock passwords. If the compromised user has an administrative account, an attacker could gain full access to the user’s operating system and certain components of FactoryTalk View SE. La herramienta DeskLock proporcionada con FactoryTalk View SE usa un algoritmo de cifrado débil que puede permitir a un atacante local y autenticado descifrar las credenciales de usuario, incluyendo el usuario de Windows o las contraseñas de Windows DeskLock. Si el usuario comprometido presenta una cuenta administrativa, un atacante podría conseguir acceso completo al sistema operativo del usuario y a determinados componentes de FactoryTalk View SE • https://www.cisa.gov/uscert/ics/advisories/icsa-20-177-03 • CWE-261: Weak Encoding for Password CWE-326: Inadequate Encryption Strength •