ID

VAR-201705-3257


CVE

CVE-2017-5176


TITLE

Rockwell Automation Connected Components Workbench DLL Load Local Code Execution Vulnerability

Trust: 0.8

sources: IVD: efb00b70-253b-4c60-8992-9defd0413fb8 // CNVD: CNVD-2017-04296

DESCRIPTION

A DLL Hijack issue was discovered in Rockwell Automation Connected Components Workbench (CCW). The following versions are affected: Connected Components Workbench - Developer Edition, v9.01.00 and earlier: 9328-CCWDEVENE, 9328-CCWDEVZHE, 9328-CCWDEVFRE, 9328-CCWDEVITE, 9328-CCWDEVDEE, 9328-CCWDEVESE, and 9328-CCWDEVPTE; and Connected Components Workbench - Free Standard Edition (All Supported Languages), v9.01.00 and earlier. Certain DLLs included with versions of CCW software can be potentially hijacked to allow an attacker to gain rights to a victim's affected personal computer. Such access rights can be at the same or potentially higher level of privileges as the compromised user account, including and up to computer administrator privileges. Rockwell Automation Connected Components Workbench Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Rockwell Automation Connected Components Workbench is an HMI editor and component-level industrial product for designing and configuring applications and implementing microcontrollers. A local attacker could exploit this vulnerability to execute arbitrary code in the context of a user running in an affected program. The software can be used for controller programming and device configuration, and is integrated with an HMI editor to further simplify stand-alone device programming

Trust: 2.7

sources: NVD: CVE-2017-5176 // JVNDB: JVNDB-2017-004364 // CNVD: CNVD-2017-04296 // BID: 97000 // IVD: efb00b70-253b-4c60-8992-9defd0413fb8 // VULHUB: VHN-113379

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: efb00b70-253b-4c60-8992-9defd0413fb8 // CNVD: CNVD-2017-04296

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:connected components workbenchscope:lteversion:9.01.00

Trust: 1.0

vendor:rockwell automationmodel:connected components workbench softwarescope:lteversion:developer edition 9.01.00

Trust: 0.8

vendor:rockwell automationmodel:connected components workbench softwarescope:lteversion:free standard edition (all supported languages) 9.01.00

Trust: 0.8

vendor:rockwellmodel:automation connected components workbenchscope:lteversion:<=v9.01.00

Trust: 0.6

vendor:rockwellautomationmodel:connected components workbenchscope:eqversion:9.01.00

Trust: 0.6

vendor:connected components workbenchmodel: - scope:eqversion:*

Trust: 0.4

vendor:rockwellmodel:automation connected components workbench free standard editionscope:eqversion:??9.1

Trust: 0.3

vendor:rockwellmodel:automation connected components workbench developer editionscope:eqversion:??9.1

Trust: 0.3

vendor:rockwellmodel:automation connected components workbench free standard editionscope:neversion:??10.01

Trust: 0.3

vendor:rockwellmodel:automation connected components workbench free standard editionscope:neversion:??10.00

Trust: 0.3

vendor:rockwellmodel:automation connected components workbench developer editionscope:neversion:??10.01

Trust: 0.3

vendor:rockwellmodel:automation connected components workbench developer editionscope:neversion:??10.00

Trust: 0.3

sources: IVD: efb00b70-253b-4c60-8992-9defd0413fb8 // CNVD: CNVD-2017-04296 // BID: 97000 // JVNDB: JVNDB-2017-004364 // CNNVD: CNNVD-201703-965 // NVD: CVE-2017-5176

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-5176
value: HIGH

Trust: 1.0

NVD: CVE-2017-5176
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-04296
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201703-965
value: HIGH

Trust: 0.6

IVD: efb00b70-253b-4c60-8992-9defd0413fb8
value: HIGH

Trust: 0.2

VULHUB: VHN-113379
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-5176
severity: MEDIUM
baseScore: 6.2
vectorString: AV:L/AC:H/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 1.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-04296
severity: MEDIUM
baseScore: 6.2
vectorString: AV:L/AC:H/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 1.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: efb00b70-253b-4c60-8992-9defd0413fb8
severity: MEDIUM
baseScore: 6.2
vectorString: AV:L/AC:H/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 1.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-113379
severity: MEDIUM
baseScore: 6.2
vectorString: AV:L/AC:H/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 1.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-5176
baseSeverity: HIGH
baseScore: 7.0
vectorString: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: efb00b70-253b-4c60-8992-9defd0413fb8 // CNVD: CNVD-2017-04296 // VULHUB: VHN-113379 // JVNDB: JVNDB-2017-004364 // CNNVD: CNNVD-201703-965 // NVD: CVE-2017-5176

PROBLEMTYPE DATA

problemtype:CWE-427

Trust: 1.1

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-113379 // JVNDB: JVNDB-2017-004364 // NVD: CVE-2017-5176

THREAT TYPE

local

Trust: 0.9

sources: BID: 97000 // CNNVD: CNNVD-201703-965

TYPE

Code problem

Trust: 0.8

sources: IVD: efb00b70-253b-4c60-8992-9defd0413fb8 // CNNVD: CNNVD-201703-965

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-004364

PATCH

title:Connected Components Workbench Softwareurl:http://www.rockwellautomation.com/global/support/connected-components/workbench.page

Trust: 0.8

title:Rockwell Automation Connected Components Workbench DLL loads patches for native code execution vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/91709

Trust: 0.6

title:Rockwell Automation Connected Components Workbench Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68694

Trust: 0.6

sources: CNVD: CNVD-2017-04296 // JVNDB: JVNDB-2017-004364 // CNNVD: CNNVD-201703-965

EXTERNAL IDS

db:NVDid:CVE-2017-5176

Trust: 3.6

db:ICS CERTid:ICSA-17-047-01

Trust: 3.4

db:BIDid:97000

Trust: 2.0

db:CNNVDid:CNNVD-201703-965

Trust: 0.9

db:CNVDid:CNVD-2017-04296

Trust: 0.8

db:JVNDBid:JVNDB-2017-004364

Trust: 0.8

db:IVDid:EFB00B70-253B-4C60-8992-9DEFD0413FB8

Trust: 0.2

db:VULHUBid:VHN-113379

Trust: 0.1

sources: IVD: efb00b70-253b-4c60-8992-9defd0413fb8 // CNVD: CNVD-2017-04296 // VULHUB: VHN-113379 // BID: 97000 // JVNDB: JVNDB-2017-004364 // CNNVD: CNNVD-201703-965 // NVD: CVE-2017-5176

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-047-01

Trust: 3.4

url:http://www.securityfocus.com/bid/97000

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5176

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2017-5176

Trust: 0.8

url:http://www.rockwellautomation.com/

Trust: 0.3

sources: CNVD: CNVD-2017-04296 // VULHUB: VHN-113379 // BID: 97000 // JVNDB: JVNDB-2017-004364 // CNNVD: CNNVD-201703-965 // NVD: CVE-2017-5176

CREDITS

Ivan Sanchez

Trust: 0.3

sources: BID: 97000

SOURCES

db:IVDid:efb00b70-253b-4c60-8992-9defd0413fb8
db:CNVDid:CNVD-2017-04296
db:VULHUBid:VHN-113379
db:BIDid:97000
db:JVNDBid:JVNDB-2017-004364
db:CNNVDid:CNNVD-201703-965
db:NVDid:CVE-2017-5176

LAST UPDATE DATE

2025-04-20T23:23:46.138000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-04296date:2017-04-13T00:00:00
db:VULHUBid:VHN-113379date:2019-10-09T00:00:00
db:BIDid:97000date:2017-03-23T00:01:00
db:JVNDBid:JVNDB-2017-004364date:2017-06-23T00:00:00
db:CNNVDid:CNNVD-201703-965date:2019-10-17T00:00:00
db:NVDid:CVE-2017-5176date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:efb00b70-253b-4c60-8992-9defd0413fb8date:2017-04-12T00:00:00
db:CNVDid:CNVD-2017-04296date:2017-04-12T00:00:00
db:VULHUBid:VHN-113379date:2017-05-19T00:00:00
db:BIDid:97000date:2017-03-22T00:00:00
db:JVNDBid:JVNDB-2017-004364date:2017-06-23T00:00:00
db:CNNVDid:CNNVD-201703-965date:2017-03-22T00:00:00
db:NVDid:CVE-2017-5176date:2017-05-19T03:29:00.293