CVE-2023-2071 – FactoryTalk View Machine Edition Vulnerable to Remote Code Execution
https://notcve.org/view.php?id=CVE-2023-2071
Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets. The device has the functionality, through a CIP class, to execute exported functions from libraries. There is a routine that restricts it to execute specific functions from two dynamic link library files. By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function. Rockwell Automation FactoryTalk View Machine Edition en PanelView Plus verifica incorrectamente la entrada del usuario, lo que permite a un atacante no autenticado lograr la ejecución remota de código a través de paquetes maliciosos manipulados. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140724 • CWE-20: Improper Input Validation CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2020-14480
https://notcve.org/view.php?id=CVE-2020-14480
Due to usernames/passwords being stored in plaintext in Random Access Memory (RAM), a local, authenticated attacker could gain access to certain credentials, including Windows Logon credentials. Debido a que los nombres de usuario/contraseñas son almacenadas en texto plano en la Memoria de Acceso Aleatorio (RAM), un atacante local y autenticado podría conseguir acceso a determinadas credenciales, incluidas las de inicio de sesión de Windows • https://www.cisa.gov/uscert/ics/advisories/icsa-20-177-03 • CWE-312: Cleartext Storage of Sensitive Information •
CVE-2020-14481
https://notcve.org/view.php?id=CVE-2020-14481
The DeskLock tool provided with FactoryTalk View SE uses a weak encryption algorithm that may allow a local, authenticated attacker to decipher user credentials, including the Windows user or Windows DeskLock passwords. If the compromised user has an administrative account, an attacker could gain full access to the user’s operating system and certain components of FactoryTalk View SE. La herramienta DeskLock proporcionada con FactoryTalk View SE usa un algoritmo de cifrado débil que puede permitir a un atacante local y autenticado descifrar las credenciales de usuario, incluyendo el usuario de Windows o las contraseñas de Windows DeskLock. Si el usuario comprometido presenta una cuenta administrativa, un atacante podría conseguir acceso completo al sistema operativo del usuario y a determinados componentes de FactoryTalk View SE • https://www.cisa.gov/uscert/ics/advisories/icsa-20-177-03 • CWE-261: Weak Encoding for Password CWE-326: Inadequate Encryption Strength •