ID

VAR-201604-0079


CVE

CVE-2016-2277


TITLE

Rockwell Automation Integrated Architecture Builder Arbitrary code execution vulnerability

Trust: 1.4

sources: IVD: 5a7a4886-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-02008 // CNNVD: CNNVD-201604-033

DESCRIPTION

IAB.exe in Rockwell Automation Integrated Architecture Builder (IAB) before 9.6.0.8 and 9.7.x before 9.7.0.2 allows remote attackers to execute arbitrary code via a crafted project file. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. The following versions are affected: Rockwell Automation IAB version 9.6.0.7 and earlier, version 9.7.0.0, version 9.7.0.1

Trust: 2.7

sources: NVD: CVE-2016-2277 // JVNDB: JVNDB-2016-001944 // CNVD: CNVD-2016-02008 // BID: 85843 // IVD: 5a7a4886-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-91096

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 5a7a4886-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-02008

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:integrated architecture builderscope:eqversion:9.7.0.0

Trust: 1.6

vendor:rockwellautomationmodel:integrated architecture builderscope:eqversion:9.7.0.1

Trust: 1.6

vendor:rockwellautomationmodel:integrated architecture builderscope:lteversion:9.6.0.7

Trust: 1.0

vendor:rockwell automationmodel:integrated architecture builderscope:eqversion:9.7.0.2

Trust: 0.8

vendor:rockwell automationmodel:integrated architecture builderscope:ltversion:9.7.x

Trust: 0.8

vendor:rockwellmodel:automation integrated architecture builderscope:lteversion:<=9.6.0.8

Trust: 0.6

vendor:rockwellmodel:automation integrated architecture builderscope:gteversion:9.7.x<=9.7.0.2

Trust: 0.6

vendor:rockwellautomationmodel:integrated architecture builderscope:eqversion:9.6.0.7

Trust: 0.6

vendor:integrated architecture buildermodel: - scope:eqversion:*

Trust: 0.2

vendor:integrated architecture buildermodel: - scope:eqversion:9.7.0.0

Trust: 0.2

vendor:integrated architecture buildermodel: - scope:eqversion:9.7.0.1

Trust: 0.2

sources: IVD: 5a7a4886-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-02008 // JVNDB: JVNDB-2016-001944 // CNNVD: CNNVD-201604-033 // NVD: CVE-2016-2277

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-2277
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-2277
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-02008
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201604-033
value: MEDIUM

Trust: 0.6

IVD: 5a7a4886-2351-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-91096
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-2277
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-02008
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 5a7a4886-2351-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-91096
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-2277
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.3
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 5a7a4886-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-02008 // VULHUB: VHN-91096 // JVNDB: JVNDB-2016-001944 // CNNVD: CNNVD-201604-033 // NVD: CVE-2016-2277

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-91096 // JVNDB: JVNDB-2016-001944 // NVD: CVE-2016-2277

THREAT TYPE

local

Trust: 0.9

sources: BID: 85843 // CNNVD: CNNVD-201604-033

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201604-033

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001944

PATCH

title:Integrated Architecture Builder (IAB)url:http://www.rockwellautomation.com/global/support/configuration.page

Trust: 0.8

title:Rockwell Automation Integrated Architecture Builder patch for arbitrary code execution vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/73682

Trust: 0.6

title:Rockwell Automation Integrated Architecture Builder Fixes for arbitrary code execution vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60768

Trust: 0.6

sources: CNVD: CNVD-2016-02008 // JVNDB: JVNDB-2016-001944 // CNNVD: CNNVD-201604-033

EXTERNAL IDS

db:NVDid:CVE-2016-2277

Trust: 3.6

db:ICS CERTid:ICSA-16-056-01

Trust: 3.1

db:CNNVDid:CNNVD-201604-033

Trust: 0.9

db:CNVDid:CNVD-2016-02008

Trust: 0.8

db:JVNDBid:JVNDB-2016-001944

Trust: 0.8

db:BIDid:85843

Trust: 0.4

db:IVDid:5A7A4886-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-91096

Trust: 0.1

sources: IVD: 5a7a4886-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-02008 // VULHUB: VHN-91096 // BID: 85843 // JVNDB: JVNDB-2016-001944 // CNNVD: CNNVD-201604-033 // NVD: CVE-2016-2277

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-056-01

Trust: 3.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2277

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2277

Trust: 0.8

url:http://www.rockwellautomation.com/

Trust: 0.3

sources: CNVD: CNVD-2016-02008 // VULHUB: VHN-91096 // BID: 85843 // JVNDB: JVNDB-2016-001944 // CNNVD: CNNVD-201604-033 // NVD: CVE-2016-2277

CREDITS

Ivan Sanchez from Nullcode Team

Trust: 0.9

sources: BID: 85843 // CNNVD: CNNVD-201604-033

SOURCES

db:IVDid:5a7a4886-2351-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2016-02008
db:VULHUBid:VHN-91096
db:BIDid:85843
db:JVNDBid:JVNDB-2016-001944
db:CNNVDid:CNNVD-201604-033
db:NVDid:CVE-2016-2277

LAST UPDATE DATE

2025-04-13T23:37:29.512000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-02008date:2016-04-07T00:00:00
db:VULHUBid:VHN-91096date:2016-04-07T00:00:00
db:BIDid:85843date:2016-04-05T00:00:00
db:JVNDBid:JVNDB-2016-001944date:2016-04-08T00:00:00
db:CNNVDid:CNNVD-201604-033date:2016-04-07T00:00:00
db:NVDid:CVE-2016-2277date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:5a7a4886-2351-11e6-abef-000c29c66e3ddate:2016-04-07T00:00:00
db:CNVDid:CNVD-2016-02008date:2016-04-07T00:00:00
db:VULHUBid:VHN-91096date:2016-04-06T00:00:00
db:BIDid:85843date:2016-04-05T00:00:00
db:JVNDBid:JVNDB-2016-001944date:2016-04-08T00:00:00
db:CNNVDid:CNNVD-201604-033date:2016-04-06T00:00:00
db:NVDid:CVE-2016-2277date:2016-04-06T23:59:15.897