// For flags

CVE-2020-12034

 

Severity Score

8.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Products that use EDS Subsystem: Version 28.0.1 and prior (FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11, RSLinx Classic: Version 4.11.00 and prior, RSNetWorx software: Version 28.00.00 and prior, Studio 5000 Logix Designer software: Version 32 and prior) is vulnerable.The EDS subsystem does not provide adequate input sanitation, which may allow an attacker to craft specialized EDS files to inject SQL queries and manipulate the database storing the EDS files. This can lead to denial-of-service conditions.

Productos que usan EDS Subsystem: versión 28.0.1 y anteriores (software FactoryTalk Linx (anteriormente llamado RSLinx Enterprise): versiones 6.00, 6.10 y 6.11, RSLinx Classic: versión 4.11.00 y anteriores, software RSNetWorx: versión 28.00.00 y anteriores, software Studio 5000 Logix Designer: versión 32 y anteriores) son vulnerables. El EDS Subsystem no proporciona un saneamiento de entrada adecuado, lo que puede permitir a un atacante diseñar archivos EDS especializados para inyectar consultas SQL y manipular la base de datos que almacena los archivos EDS. Esto puede conllevar a condiciones de denegación de servicio.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-04-21 CVE Reserved
  • 2020-05-20 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rockwellautomation
Search vendor "Rockwellautomation"
Eds Subsystem
Search vendor "Rockwellautomation" for product "Eds Subsystem"
<= 28.0.1
Search vendor "Rockwellautomation" for product "Eds Subsystem" and version " <= 28.0.1"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx
Search vendor "Rockwellautomation" for product "Rslinx"
<= 4.11.00
Search vendor "Rockwellautomation" for product "Rslinx" and version " <= 4.11.00"
classic
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
6.00.00
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "6.00.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
6.10.00
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "6.10.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
6.11.00
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "6.11.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rsnetworx
Search vendor "Rockwellautomation" for product "Rsnetworx"
<= 28.00.00
Search vendor "Rockwellautomation" for product "Rsnetworx" and version " <= 28.00.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Studio 5000 Logix Designer
Search vendor "Rockwellautomation" for product "Studio 5000 Logix Designer"
<= 32.0
Search vendor "Rockwellautomation" for product "Studio 5000 Logix Designer" and version " <= 32.0"
-
Affected