![]() ![]() ![]() ![]() This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in remote code execution. Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects that can be deserialized. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the Connected Components Workbench software. This may allow an attacker to craft malicious files that, when opened by Rockwell Automation Connected Components Workbench v12.00.00 and prior, can traverse the file system. The parsing mechanism that processes certain file types does not provide input sanitization for file paths. An attacker could exploit this to pass data from local files to a remote web server, leading to a loss of confidentiality.Ĭonnected_components_workbench, Isagraf, Safety_instrumented_systems_workstation When opening a malicious solution file provided by an attacker, the application suffers from an XML external entity vulnerability due to an unsafe call within a dynamic link library file. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |