ID

VAR-202008-0511


CVE

CVE-2020-22722


TITLE

Rapid Software LLC Rapid SCADA Vulnerability in unlimited upload of dangerous types of files in

Trust: 0.8

sources: JVNDB: JVNDB-2020-009608

DESCRIPTION

Rapid Software LLC Rapid SCADA 5.8.0 is affected by a local privilege escalation vulnerability in the ScadaAgentSvc.exe executable file. An attacker can obtain admin privileges by placing a malicious .exe file in the application and renaming it ScadaAgentSvc.exe, which would result in executing the binary as NT AUTHORITY\SYSTEM in a Windows operating system. For example, an attacker can plant a reverse shell from a low privileged user account and by restarting the computer, the malicious service will be started as NT AUTHORITY\SYSTEM by giving the attacker full system access to the remote PC. (DoS) It may be put into a state. Rapid SCADA is a free, open source, and fully functional SCADA (Data Acquisition and Monitoring System) software

Trust: 2.16

sources: NVD: CVE-2020-22722 // JVNDB: JVNDB-2020-009608 // CNVD: CNVD-2020-47566

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-47566

AFFECTED PRODUCTS

vendor:rapidscadamodel:rapid scadascope:eqversion:5.8.0

Trust: 1.0

vendor:rapid scadamodel:rapid scadascope:eqversion:5.8.0

Trust: 0.8

vendor:rapidmodel:scadascope:eqversion:5.8.0

Trust: 0.6

sources: CNVD: CNVD-2020-47566 // JVNDB: JVNDB-2020-009608 // NVD: CVE-2020-22722

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-22722
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-009608
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-47566
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202008-829
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-22722
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-009608
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-47566
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-22722
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-009608
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-47566 // JVNDB: JVNDB-2020-009608 // CNNVD: CNNVD-202008-829 // NVD: CVE-2020-22722

PROBLEMTYPE DATA

problemtype:CWE-434

Trust: 1.8

sources: JVNDB: JVNDB-2020-009608 // NVD: CVE-2020-22722

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202008-829

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202008-829

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-009608

PATCH

title:Top Pageurl:https://rapidscada.org/

Trust: 0.8

sources: JVNDB: JVNDB-2020-009608

EXTERNAL IDS

db:NVDid:CVE-2020-22722

Trust: 3.0

db:JVNDBid:JVNDB-2020-009608

Trust: 0.8

db:CNVDid:CNVD-2020-47566

Trust: 0.6

db:CNNVDid:CNNVD-202008-829

Trust: 0.6

sources: CNVD: CNVD-2020-47566 // JVNDB: JVNDB-2020-009608 // CNNVD: CNNVD-202008-829 // NVD: CVE-2020-22722

REFERENCES

url:https://syhack.wordpress.com/2020/04/21/rapid-scada-local-privilege-escalation-vulnerability/

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-22722

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-22722

Trust: 0.8

sources: CNVD: CNVD-2020-47566 // JVNDB: JVNDB-2020-009608 // CNNVD: CNNVD-202008-829 // NVD: CVE-2020-22722

SOURCES

db:CNVDid:CNVD-2020-47566
db:JVNDBid:JVNDB-2020-009608
db:CNNVDid:CNNVD-202008-829
db:NVDid:CVE-2020-22722

LAST UPDATE DATE

2024-11-23T22:29:30.193000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-47566date:2020-08-22T00:00:00
db:JVNDBid:JVNDB-2020-009608date:2020-11-20T07:22:35
db:CNNVDid:CNNVD-202008-829date:2021-01-05T00:00:00
db:NVDid:CVE-2020-22722date:2024-11-21T05:13:23.217

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-47566date:2020-08-22T00:00:00
db:JVNDBid:JVNDB-2020-009608date:2020-11-20T07:22:35
db:CNNVDid:CNNVD-202008-829date:2020-08-14T00:00:00
db:NVDid:CVE-2020-22722date:2020-08-14T16:15:17.070