
CVE-2022-2465 – ISaGRAF Workbench Deserialization of Untrusted Data CWE-502
https://notcve.org/view.php?id=CVE-2022-2465
25 Aug 2022 — Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Deserialization of Untrusted Data vulnerability. ISaGRAF Workbench does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in ISaGRAF Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited. Rockwell Automation ISaGRAF Workbench software versiones 6.... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03 • CWE-502: Deserialization of Untrusted Data •

CVE-2022-2464 – ISaGRAF Workbench Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-22
https://notcve.org/view.php?id=CVE-2022-2464
25 Aug 2022 — Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. Crafted malicious files can allow an attacker to traverse the file system when opened by ISaGRAF Workbench. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the ISaGRAF Workbench software. User interaction is required for this exploit to be successful. Rockwell Automation ISaGRAF Workbench software versiones 6.... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2022-2463 – ISaGRAF Workbench Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-22
https://notcve.org/view.php?id=CVE-2022-2463
25 Aug 2022 — Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. A crafted malicious .7z exchange file may allow an attacker to gain the privileges of the ISaGRAF Workbench software when opened. If the software is running at the SYSTEM level, then the attacker will gain admin level privileges. User interaction is required for this exploit to be successful. Rockwell Automation ISaGRAF Workbench software versiones 6.0 hasta 6.6.9, están afectadas por un... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2022-1118 – Rockwell Automation ISaGRAF Deserialization of Untrusted Data
https://notcve.org/view.php?id=CVE-2022-1118
08 Apr 2022 — Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploited Connected Components Workbench (version... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01 • CWE-502: Deserialization of Untrusted Data •