ID

VAR-202104-1938


CVE

CVE-2021-27470


TITLE

Rockwell Automation  Made  FactoryTalk AssetCentre  Multiple vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2021-001308

DESCRIPTION

A deserialization vulnerability exists in how the LogService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre. * Deserialize untrusted data (CWE-502) - CVE-2021-27470 , CVE-2021-27466 , CVE-2021-27462 , CVE-2021-27460 ‥ * Use of potentially dangerous functions (CWE-676) - CVE-2021-27474 ‥ * OS Command injection (CWE-78) - CVE-2021-27476 ‥ * SQL injection (CWE-89) - CVE-2021-27472 , CVE-2021-27468 , CVE-2021-27464The expected impact depends on each vulnerability, but it may be affected as follows. * Arbitrary command executed by an unauthenticated remote third party - CVE-2021-27476 , CVE-2021-27470 , CVE-2021-27466 , CVE-2021-27462 ‥ * By an unauthenticated remote third party FactoryTalk AssetCentre Confidential data is changed - CVE-2021-27474 ‥ * Any by an unauthenticated remote third party SQL The statement is executed - CVE-2021-27472 , CVE-2021-27468 , CVE-2021-27464 ‥ * By an unauthenticated remote third party FactoryTalk AssetCentre Accessed to main server and all agent machines - CVE-2021-27460. Rockwell Automation FactoryTalk AssetCentre is an asset management software tool launched by Rockwell Automation, USA, which can be used by manufacturers and industrial enterprises for centralized management of controllers and other automation-related assets. Provides centralized tools for securing, managing, versioning, tracking and reporting automation-related asset information across the plant FactoryTalk AssetCentre verifies serialized data A security vulnerability exists that allows remote, unauthenticated attackers to The center executes arbitrary commands

Trust: 2.34

sources: NVD: CVE-2021-27470 // JVNDB: JVNDB-2021-001308 // CNVD: CNVD-2021-26404 // VULHUB: VHN-386737 // VULMON: CVE-2021-27470

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-26404

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:factorytalk assetcentrescope:lteversion:10.00

Trust: 1.0

vendor:rockwell automationmodel:factorytalk asset centrescope:eqversion: -

Trust: 0.8

vendor:rockwell automationmodel:factorytalk asset centrescope:lteversion:v10.00 and earlier

Trust: 0.8

vendor:rockwellmodel:automation factorytalk assetcentrescope:lteversion:<=10.00

Trust: 0.6

sources: CNVD: CNVD-2021-26404 // JVNDB: JVNDB-2021-001308 // NVD: CVE-2021-27470

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27470
value: CRITICAL

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2021-27470
value: CRITICAL

Trust: 1.0

IPA: JVNDB-2021-001308
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2021-26404
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202104-064
value: CRITICAL

Trust: 0.6

VULHUB: VHN-386737
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-27470
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2021-26404
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-386737
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-27470
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2021-27470
baseSeverity: CRITICAL
baseScore: 10.0
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.8
version: 3.1

Trust: 1.0

IPA: JVNDB-2021-001308
baseSeverity: CRITICAL
baseScore: 10
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-26404 // VULHUB: VHN-386737 // JVNDB: JVNDB-2021-001308 // CNNVD: CNNVD-202104-064 // NVD: CVE-2021-27470 // NVD: CVE-2021-27470

PROBLEMTYPE DATA

problemtype:CWE-502

Trust: 1.1

problemtype:Deserialization of untrusted data (CWE-502) [IPA Evaluation ]

Trust: 0.8

problemtype: Use of potentially dangerous functions (CWE-676) [IPA Evaluation ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [IPA Evaluation ]

Trust: 0.8

problemtype:SQL injection (CWE-89) [IPA Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-386737 // JVNDB: JVNDB-2021-001308 // NVD: CVE-2021-27470

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202104-064

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202104-064

PATCH

title:QA46277 (Login required)url:https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831

Trust: 0.8

title:Patch for Rockwell Automation FactoryTalk AssetCentre Untrusted Data Deserialization Vulnerability (CNVD-2021-26404)url:https://www.cnvd.org.cn/patchInfo/show/257316

Trust: 0.6

title:Rockwell Automation FactoryTalk AssetCentre Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=146614

Trust: 0.6

sources: CNVD: CNVD-2021-26404 // JVNDB: JVNDB-2021-001308 // CNNVD: CNNVD-202104-064

EXTERNAL IDS

db:NVDid:CVE-2021-27470

Trust: 3.2

db:ICS CERTid:ICSA-21-091-01

Trust: 3.1

db:JVNid:JVNVU93112256

Trust: 0.8

db:JVNDBid:JVNDB-2021-001308

Trust: 0.8

db:CNNVDid:CNNVD-202104-064

Trust: 0.7

db:CNVDid:CNVD-2021-26404

Trust: 0.6

db:AUSCERTid:ESB-2021.1134

Trust: 0.6

db:VULHUBid:VHN-386737

Trust: 0.1

db:VULMONid:CVE-2021-27470

Trust: 0.1

sources: CNVD: CNVD-2021-26404 // VULHUB: VHN-386737 // VULMON: CVE-2021-27470 // JVNDB: JVNDB-2021-001308 // CNNVD: CNNVD-202104-064 // NVD: CVE-2021-27470

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-091-01

Trust: 2.0

url:https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?relaystate=rpid%3drockwellautomation.custhelp.com%26relaystate%3danswers%2fanswer_view%2fa_id%2f1130831

Trust: 1.7

url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-091-01

Trust: 1.7

url:http://jvn.jp/cert/jvnvu93112256

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2021.1134

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2021-27470/

Trust: 0.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/199261

Trust: 0.1

sources: CNVD: CNVD-2021-26404 // VULHUB: VHN-386737 // VULMON: CVE-2021-27470 // JVNDB: JVNDB-2021-001308 // CNNVD: CNNVD-202104-064 // NVD: CVE-2021-27470

SOURCES

db:CNVDid:CNVD-2021-26404
db:VULHUBid:VHN-386737
db:VULMONid:CVE-2021-27470
db:JVNDBid:JVNDB-2021-001308
db:CNNVDid:CNNVD-202104-064
db:NVDid:CVE-2021-27470

LAST UPDATE DATE

2024-08-14T13:54:05.324000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-26404date:2021-04-12T00:00:00
db:VULHUBid:VHN-386737date:2022-03-29T00:00:00
db:JVNDBid:JVNDB-2021-001308date:2021-04-05T06:09:00
db:CNNVDid:CNNVD-202104-064date:2022-03-30T00:00:00
db:NVDid:CVE-2021-27470date:2022-03-29T19:18:28.530

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-26404date:2021-04-09T00:00:00
db:VULHUBid:VHN-386737date:2022-03-23T00:00:00
db:JVNDBid:JVNDB-2021-001308date:2021-04-05T00:00:00
db:CNNVDid:CNNVD-202104-064date:2021-04-01T00:00:00
db:NVDid:CVE-2021-27470date:2022-03-23T20:15:08.980