In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the operating system, a local, authenticated attacker may corrupt the associated memory space allowing for arbitrary code execution. Rockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.
References
Link | Resource |
---|---|
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944 | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2020-06-18T00:00:00
Updated: 2020-07-20T15:10:06
Reserved: 2020-04-21T00:00:00
Link: CVE-2020-12031
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-07-20T16:15:12.257
Modified: 2021-09-23T13:34:39.470
Link: CVE-2020-12031
JSON object: View
Redhat Information
No data.