Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.
References
Link | Resource |
---|---|
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04 | Vendor Advisory |
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699 | Permissions Required Vendor Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01 | Third Party Advisory US Government Resource |
https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2022-03-18T18:00:30
Updated: 2022-03-18T18:00:30
Reserved: 2020-09-04T00:00:00
Link: CVE-2020-25182
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-03-18T18:15:09.243
Modified: 2022-04-05T13:36:23.510
Link: CVE-2020-25182
JSON object: View
Redhat Information
No data.
CWE