ID

VAR-202106-1996


CVE

CVE-2020-25176


TITLE

Rockwell Automation  Made  ISaGRAF5 Runtime  Multiple vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2021-001882

DESCRIPTION

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution. Rockwell Automation Provided by the company ISaGRAF5 Runtime contains multiple vulnerabilities: * relative path traversal (CWE-23) - CVE-2020-25176 It was * Plain text storage of authentication information (CWE-256) - CVE-2020-25184 It was * Sending important information in clear text (CWE-319) - CVE-2020-25178 It was * DLL File search paths are not properly controlled (CWE-427) - CVE-2020-25182 It was * Using hardcoded encryption keys (CWE-321) - CVE-2020-25180The expected impacts vary depending on the vulnerability, but some of the following may occur: * Arbitrary code is executed by a remote third party - CVE-2020-25176 It was * Passwords and information may be stolen by local users. - CVE-2020-25184 It was * Files can be uploaded, read, and deleted by a remote third party. - CVE-2020-25178 It was * ISaGRAF Runtime But Microsoft Windows If the vulnerability is running on a local machine, a local attacker may be able to execute arbitrary code. - CVE-2020-25182 It was * Information may be stolen by a remote third party. - CVE-2020-25180. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 2.25

sources: NVD: CVE-2020-25176 // JVNDB: JVNDB-2021-001882 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-179128

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:isagraf runtimescope:ltversion:6.0

Trust: 1.0

vendor:schneider electricmodel:micom c264scope:ltversion:d6.1

Trust: 1.0

vendor:schneider electricmodel:pacis gtwscope:eqversion:5.1

Trust: 1.0

vendor:schneider electricmodel:pacis gtwscope:eqversion:6.3

Trust: 1.0

vendor:rockwellautomationmodel:isagraf runtimescope:gteversion:5.0

Trust: 1.0

vendor:schneider electricmodel:saitel dpscope:lteversion:11.06.21

Trust: 1.0

vendor:schneider electricmodel:epas gtwscope:eqversion:6.4

Trust: 1.0

vendor:schneider electricmodel:saitel drscope:lteversion:11.06.12

Trust: 1.0

vendor:xylemmodel:multismartscope:ltversion:3.2.0

Trust: 1.0

vendor:rockwellautomationmodel:micro820scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:easergy t300scope:lteversion:2.7.1

Trust: 1.0

vendor:rockwellautomationmodel:micro870scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:pacis gtwscope:eqversion:5.2

Trust: 1.0

vendor:rockwellautomationmodel:micro810scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:scd2200scope:lteversion:10024

Trust: 1.0

vendor:rockwellautomationmodel:micro850scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:pacis gtwscope:eqversion:6.1

Trust: 1.0

vendor:rockwellautomationmodel:micro830scope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:aadvance controllerscope:lteversion:1.40

Trust: 1.0

vendor:rockwellautomationmodel:isagraf free runtimescope:lteversion:6.6.8

Trust: 1.0

vendor:schneider electricmodel:easergy c5scope:ltversion:1.1.0

Trust: 1.0

vendor:rockwell automationmodel:isagraf runtimescope: - version: -

Trust: 0.8

vendor:xylemmodel:multismartscope: - version: -

Trust: 0.8

vendor:ge steam powermodel:alspa s6 mfc1000scope: - version: -

Trust: 0.8

vendor:ge steam powermodel:alspa s6 mfc3000scope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:aadvance controllerscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:isagraf free runtimescope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:micro800scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-001882 // NVD: CVE-2020-25176

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-25176
value: CRITICAL

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2020-25176
value: CRITICAL

Trust: 1.0

NVD: CVE-2020-25176
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202106-530
value: CRITICAL

Trust: 0.6

VULHUB: VHN-179128
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-25176
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-179128
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-25176
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2020-25176
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.3
impactScore: 6.0
version: 3.1

Trust: 1.0

IPA: JVNDB-2021-001882
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-179128 // JVNDB: JVNDB-2021-001882 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-530 // NVD: CVE-2020-25176 // NVD: CVE-2020-25176

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.1

problemtype:CWE-23

Trust: 1.0

problemtype:Relative past traversal (CWE-23) [IPA evaluation ]

Trust: 0.8

problemtype: Plain text storage of authentication information (CWE-256) [IPA evaluation ]

Trust: 0.8

problemtype: Sending important information in clear text (CWE-319) [IPA evaluation ]

Trust: 0.8

problemtype: Using hardcoded encryption keys (CWE-321) [IPA evaluation ]

Trust: 0.8

problemtype: Uncontrolled search path elements (CWE-427) [IPA evaluation ]

Trust: 0.8

sources: VULHUB: VHN-179128 // JVNDB: JVNDB-2021-001882 // NVD: CVE-2020-25176

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202106-530

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

PATCH

title:Xylem Product Security Advisoryurl:https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699

Trust: 0.8

title:Rockwell Automation ISaGRAF Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=153710

Trust: 0.6

sources: JVNDB: JVNDB-2021-001882 // CNNVD: CNNVD-202106-530

EXTERNAL IDS

db:NVDid:CVE-2020-25176

Trust: 3.3

db:ICS CERTid:ICSA-20-280-01

Trust: 2.5

db:SCHNEIDERid:SEVD-2021-159-04

Trust: 1.7

db:JVNid:JVNVU90811375

Trust: 0.8

db:JVNDBid:JVNDB-2021-001882

Trust: 0.8

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021120106

Trust: 0.6

db:CS-HELPid:SB2021060920

Trust: 0.6

db:AUSCERTid:ESB-2021.2163

Trust: 0.6

db:CNNVDid:CNNVD-202106-530

Trust: 0.6

db:VULHUBid:VHN-179128

Trust: 0.1

sources: VULHUB: VHN-179128 // JVNDB: JVNDB-2021-001882 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-530 // NVD: CVE-2020-25176

REFERENCES

url:https://download.schneider-electric.com/files?p_doc_ref=sevd-2021-159-04

Trust: 1.7

url:https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699

Trust: 1.7

url:https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01

Trust: 1.7

url:https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf

Trust: 1.7

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-280-01

Trust: 1.4

url:http://jvn.jp/cert/jvnvu90811375

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25176

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25178

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25180

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25182

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25184

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2020-25176/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2163

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021060920

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021120106

Trust: 0.6

sources: VULHUB: VHN-179128 // JVNDB: JVNDB-2021-001882 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-530 // NVD: CVE-2020-25176

CREDITS

Kaspersky reported these vulnerabilities to Rockwell Automation.

Trust: 0.6

sources: CNNVD: CNNVD-202106-530

SOURCES

db:VULHUBid:VHN-179128
db:JVNDBid:JVNDB-2021-001882
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202106-530
db:NVDid:CVE-2020-25176

LAST UPDATE DATE

2024-08-14T12:57:48.990000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-179128date:2022-04-04T00:00:00
db:JVNDBid:JVNDB-2021-001882date:2024-06-20T08:49:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202106-530date:2022-04-06T00:00:00
db:NVDid:CVE-2020-25176date:2022-04-04T20:56:17.697

SOURCES RELEASE DATE

db:VULHUBid:VHN-179128date:2022-03-18T00:00:00
db:JVNDBid:JVNDB-2021-001882date:2021-06-11T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202106-530date:2021-06-08T00:00:00
db:NVDid:CVE-2020-25176date:2022-03-18T18:15:09.060