ID

VAR-202105-1525


CVE

CVE-2021-27471


TITLE

Rockwell Automation  Made  Connected Components Workbench  Multiple vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2021-001430

DESCRIPTION

The parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by Rockwell Automation Connected Components Workbench v12.00.00 and prior, can traverse the file system. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the Connected Components Workbench software. User interaction is required for this exploit to be successful. * Deserialization of untrusted data (CWE-502) - CVE-2021-27475 ‥ * Path traversal (CWE-22) - CVE-2021-27471 ‥ * Incorrect input confirmation (CWE-20) - CVE-2021-27473The expected impact depends on each vulnerability, but it may be affected as follows. * When a local user opens a malicious serialized object created by a third party in the product, the code is executed remotely. - CVE-2021-27475 ‥ * When a local user opens a malicious file created by a third party with the corresponding product, the existing file is overwritten or a new file is created with the authority of the corresponding product. - CVE-2021-27471 ‥ * Illegal created by a malicious user .ccwarc By opening the archive file with the corresponding product, the authority of the product is acquired. - CVE-2021-27473. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. An automatic programming software

Trust: 2.25

sources: NVD: CVE-2021-27471 // JVNDB: JVNDB-2021-001430 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-386738

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:connected components workbenchscope:lteversion:12.00.00

Trust: 1.0

vendor:rockwell automationmodel:connected components workbenchscope:eqversion: -

Trust: 0.8

vendor:rockwell automationmodel:connected components workbenchscope:lteversion:v12.00.00 and earlier

Trust: 0.8

sources: JVNDB: JVNDB-2021-001430 // NVD: CVE-2021-27471

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27471
value: HIGH

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2021-27471
value: HIGH

Trust: 1.0

IPA: JVNDB-2021-001430
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202105-800
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

VULHUB: VHN-386738
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-27471
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-386738
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-27471
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 6.0
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2021-27471
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 6.0
version: 3.1

Trust: 1.0

IPA: JVNDB-2021-001430
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-386738 // JVNDB: JVNDB-2021-001430 // CNNVD: CNNVD-202105-800 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-27471 // NVD: CVE-2021-27471

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.1

problemtype:Incorrect input confirmation (CWE-20) [IPA Evaluation ]

Trust: 0.8

problemtype: Path traversal (CWE-22) [IPA Evaluation ]

Trust: 0.8

problemtype: Deserialization of untrusted data (CWE-502) [IPA Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-386738 // JVNDB: JVNDB-2021-001430 // NVD: CVE-2021-27471

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202105-800

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202105-800

PATCH

title:industrial security advisory from Rockwell Automation ( Login required )url:https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1131435

Trust: 0.8

title:Rockwell Automation Connected Components Workbench Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=150443

Trust: 0.6

sources: JVNDB: JVNDB-2021-001430 // CNNVD: CNNVD-202105-800

EXTERNAL IDS

db:ICS CERTid:ICSA-21-133-01

Trust: 2.5

db:NVDid:CVE-2021-27471

Trust: 2.5

db:JVNid:JVNVU95873084

Trust: 0.8

db:JVNDBid:JVNDB-2021-001430

Trust: 0.8

db:AUSCERTid:ESB-2021.1650

Trust: 0.6

db:CS-HELPid:SB2021051401

Trust: 0.6

db:CNNVDid:CNNVD-202105-800

Trust: 0.6

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:VULHUBid:VHN-386738

Trust: 0.1

sources: VULHUB: VHN-386738 // JVNDB: JVNDB-2021-001430 // CNNVD: CNNVD-202105-800 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-27471

REFERENCES

url:https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131435

Trust: 1.7

url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-133-01

Trust: 1.7

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-133-01

Trust: 1.4

url:http://jvn.jp/cert/jvnvu95873084

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021051401

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1650

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2021-27471/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

sources: VULHUB: VHN-386738 // JVNDB: JVNDB-2021-001430 // CNNVD: CNNVD-202105-800 // CNNVD: CNNVD-202104-975 // NVD: CVE-2021-27471

SOURCES

db:VULHUBid:VHN-386738
db:JVNDBid:JVNDB-2021-001430
db:CNNVDid:CNNVD-202105-800
db:CNNVDid:CNNVD-202104-975
db:NVDid:CVE-2021-27471

LAST UPDATE DATE

2024-08-14T12:52:26.008000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-386738date:2022-03-29T00:00:00
db:JVNDBid:JVNDB-2021-001430date:2021-05-17T08:36:00
db:CNNVDid:CNNVD-202105-800date:2022-03-30T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:NVDid:CVE-2021-27471date:2022-03-29T19:20:48.807

SOURCES RELEASE DATE

db:VULHUBid:VHN-386738date:2022-03-23T00:00:00
db:JVNDBid:JVNDB-2021-001430date:2021-05-17T00:00:00
db:CNNVDid:CNNVD-202105-800date:2021-05-13T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:NVDid:CVE-2021-27471date:2022-03-23T20:15:09.037