Page 8 of 57 results (0.004 seconds)

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 1

All versions of FactoryTalk View SE do not properly validate input of filenames within a project directory. A remote, unauthenticated attacker may be able to execute a crafted file on a remote endpoint that may result in remote code execution (RCE). Rockwell Automation recommends applying patch 1126289. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx. Todas las versiones de FactoryTalk View SE no comprueban apropiadamente una entrada de nombres de archivo dentro de un directorio de proyecto. • http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944 https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the operating system, a local, authenticated attacker may corrupt the associated memory space allowing for arbitrary code execution. Rockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx. En todas las versiones de FactoryTalk View SE, después de omitir los mecanismos de corrupción de memoria encontrados en el sistema operativo, un atacante autenticado local puede corromper el espacio de memoria asociado permitiendo una ejecución de código arbitrario. Rockwell Automation recomienda aplicar el parche 1126290. • https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944 https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •

CVSS: 5.3EPSS: 5%CPEs: 1EXPL: 0

All versions of FactoryTalk View SE disclose the hostnames and file paths for certain files within the system. A remote, authenticated attacker may be able to leverage this information for reconnaissance efforts. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs. Todas las versiones de FactoryTalk View SE, divulgan los nombres de host y las rutas de archivos para determinados archivos dentro del sistema. • http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944 https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

In Rockwell Automation FactoryTalk Services Platform, all versions, the redundancy host service (RdcyHost.exe) does not validate supplied identifiers, which could allow an unauthenticated, adjacent attacker to execute remote COM objects with elevated privileges. En Rockwell Automation FactoryTalk Services Platform, todas las versiones, el servicio de host de redundancia (RdcyHost.exe) no comprueba los identificadores suministrados, lo que podría permitir a un atacante adyacente no autenticado ejecutar objetos COM remotos con privilegios elevados This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation FactoryTalk View SE. Authentication is not required to exploit this vulnerability. The specific flaw exists within the AddAgent method. The issue results from a lack of authentication required to instantiate a COM object on the server. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. • https://www.us-cert.gov/ics/advisories/icsa-20-170-04 • CWE-20: Improper Input Validation •

CVSS: 8.1EPSS: 4%CPEs: 1EXPL: 1

In all versions of FactoryTalk View SEA remote, an authenticated attacker may be able to utilize certain handlers to interact with the data on the remote endpoint since those handlers do not enforce appropriate permissions. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs. En todas las versiones de FactoryTalk View SEA un atacante autenticado remoto puede ser capaz de usar determinados manejadores para interactuar con los datos en el endpoint remoto, ya que esos controladores no aplican los permisos apropiados. Rockwell Automation recomienda habilitar las funciones de seguridad integradas que se encuentran en FactoryTalk View SE. • http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944 https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05 • CWE-264: Permissions, Privileges, and Access Controls CWE-306: Missing Authentication for Critical Function •