// For flags

CVE-2021-27473

Rockwell Automation Connected Components Workbench Improper Input Validation

Severity Score

8.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths specified within the .ccwarc archive file during extraction. This type of vulnerability is also commonly referred to as a Zip Slip. A local, authenticated attacker can create a malicious .ccwarc archive file that, when opened by Connected Components Workbench, will allow the attacker to gain the privileges of the software. If the software is running at SYSTEM level, the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.

Rockwell Automation Connected Components Workbench v12.00.00 y anteriores, no sanea las rutas especificadas dentro del archivo .ccwarc durante la extracción. Este tipo de vulnerabilidad también es conocida comúnmente como Zip Slip. Un atacante local y autenticado puede crear un archivo .ccwarc malicioso que, cuando sea abierto por Connected Components Workbench, permitirá al atacante alcanzar los privilegios del software. Si el software es ejecutado en el nivel SYSTEM, el atacante obtendrá privilegios de nivel de administrador. Es requerida una interacción del usuario para que esta explotación tenga éxito

*Credits: Mashav Sapir of Claroty reported these vulnerabilities to Rockwell Automation.
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-02-19 CVE Reserved
  • 2022-03-23 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rockwellautomation
Search vendor "Rockwellautomation"
Connected Components Workbench
Search vendor "Rockwellautomation" for product "Connected Components Workbench"
<= 12.00.00
Search vendor "Rockwellautomation" for product "Connected Components Workbench" and version " <= 12.00.00"
-
Affected