// For flags

CVE-2020-12001

Rockwell Automation FactoryTalk Linx CopyRenameProject Directory Traversal Remote Code Execution Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later, Studio 5000 Launcher: Version 31 and later Stud, 5000 Logix Designer software: Version 32 and prior is vulnerable. The parsing mechanism that processes certain file types does not provide input sanitation. This may allow an attacker to use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code.

FactoryTalk Linx versiones 6.00, 6.10 y 6.11, RSLinx Classic versiones v4.11.00 y anteriores, Connected Components Workbench: versión 12 y anteriores, ControlFLASH: versión 14 y posteriores, ControlFLASH Plus: versión 1 y posteriores, FactoryTalk Asset Center: versión 9 y posteriores , FactoryTalk Linx CommDTM: versión 1 y posteriores, Studio 5000 Launcher: versión 31 y posteriores a Stud, software 5000 Logix Designer: versión 32 y anteriores son vulnerables. El mecanismo de análisis que procesa determinados tipos de archivos no proporciona un saneamiento de entrada. Esto puede permitir a un atacante usar archivos especialmente diseñados para atravesar el sistema de archivos y modificar o exponer datos confidenciales o ejecutar código arbitrario

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Studio 5000. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of the CopyRenameProject parameter provided to hmi_isapi.dll. The issue results from the lack of proper validation of user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process.

*Credits: Chris Anastasio (muffin) and Steven Seeley (mr_me) of Incite Team
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-04-21 CVE Reserved
  • 2020-06-15 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-10-09 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rockwellautomation
Search vendor "Rockwellautomation"
Factorytalk Linx
Search vendor "Rockwellautomation" for product "Factorytalk Linx"
6.00
Search vendor "Rockwellautomation" for product "Factorytalk Linx" and version "6.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Factorytalk Linx
Search vendor "Rockwellautomation" for product "Factorytalk Linx"
6.10
Search vendor "Rockwellautomation" for product "Factorytalk Linx" and version "6.10"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Factorytalk Linx
Search vendor "Rockwellautomation" for product "Factorytalk Linx"
6.11
Search vendor "Rockwellautomation" for product "Factorytalk Linx" and version "6.11"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Classic
Search vendor "Rockwellautomation" for product "Rslinx Classic"
<= 4.11.00
Search vendor "Rockwellautomation" for product "Rslinx Classic" and version " <= 4.11.00"
-
Affected