ID

VAR-202106-1997


CVE

CVE-2020-25180


TITLE

Rockwell Automation  Made  ISaGRAF5 Runtime  Multiple vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2021-001882

DESCRIPTION

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device. Rockwell Automation Provided by the company ISaGRAF5 Runtime contains multiple vulnerabilities: * relative path traversal (CWE-23) - CVE-2020-25176 It was * Plain text storage of authentication information (CWE-256) - CVE-2020-25184 It was * Sending important information in clear text (CWE-319) - CVE-2020-25178 It was * DLL File search paths are not properly controlled (CWE-427) - CVE-2020-25182 It was * Using hardcoded encryption keys (CWE-321) - CVE-2020-25180The expected impacts vary depending on the vulnerability, but some of the following may occur: * Arbitrary code is executed by a remote third party - CVE-2020-25176 It was * Passwords and information may be stolen by local users. - CVE-2020-25184 It was * Files can be uploaded, read, and deleted by a remote third party. - CVE-2020-25178 It was * ISaGRAF Runtime But Microsoft Windows If the vulnerability is running on a local machine, a local attacker may be able to execute arbitrary code. - CVE-2020-25182 It was * Information may be stolen by a remote third party. - CVE-2020-25180. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Rockwell Automation ISaGRAF is an automation software technology developed by Rockwell Automation in the United States for creating integrated automation solutions. It is designed to be scalable and portable, suitable for developing small controllers and large distributed automation systems

Trust: 2.25

sources: NVD: CVE-2020-25180 // JVNDB: JVNDB-2021-001882 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-179133

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:isagraf runtimescope:ltversion:6.0

Trust: 1.0

vendor:schneider electricmodel:micom c264scope:ltversion:d6.1

Trust: 1.0

vendor:schneider electricmodel:pacis gtwscope:eqversion:5.1

Trust: 1.0

vendor:schneider electricmodel:pacis gtwscope:eqversion:6.3

Trust: 1.0

vendor:rockwellautomationmodel:isagraf runtimescope:gteversion:5.0

Trust: 1.0

vendor:schneider electricmodel:saitel dpscope:lteversion:11.06.21

Trust: 1.0

vendor:schneider electricmodel:epas gtwscope:eqversion:6.4

Trust: 1.0

vendor:schneider electricmodel:saitel drscope:lteversion:11.06.12

Trust: 1.0

vendor:xylemmodel:multismartscope:ltversion:3.2.0

Trust: 1.0

vendor:rockwellautomationmodel:micro820scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:easergy t300scope:lteversion:2.7.1

Trust: 1.0

vendor:rockwellautomationmodel:micro870scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:pacis gtwscope:eqversion:5.2

Trust: 1.0

vendor:rockwellautomationmodel:micro810scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:scd2200scope:lteversion:10024

Trust: 1.0

vendor:rockwellautomationmodel:micro850scope:eqversion: -

Trust: 1.0

vendor:schneider electricmodel:pacis gtwscope:eqversion:6.1

Trust: 1.0

vendor:rockwellautomationmodel:micro830scope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:aadvance controllerscope:lteversion:1.40

Trust: 1.0

vendor:rockwellautomationmodel:isagraf free runtimescope:lteversion:6.6.8

Trust: 1.0

vendor:schneider electricmodel:easergy c5scope:ltversion:1.1.0

Trust: 1.0

vendor:rockwell automationmodel:isagraf runtimescope: - version: -

Trust: 0.8

vendor:xylemmodel:multismartscope: - version: -

Trust: 0.8

vendor:ge steam powermodel:alspa s6 mfc1000scope: - version: -

Trust: 0.8

vendor:ge steam powermodel:alspa s6 mfc3000scope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:aadvance controllerscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:isagraf free runtimescope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:micro800scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-001882 // NVD: CVE-2020-25180

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-25180
value: MEDIUM

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2020-25180
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2021-001882
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202106-529
value: MEDIUM

Trust: 0.6

VULHUB: VHN-179133
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-25180
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-179133
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-25180
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2020-25180
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 3.6
version: 3.1

Trust: 1.0

IPA: JVNDB-2021-001882
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-179133 // JVNDB: JVNDB-2021-001882 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-529 // NVD: CVE-2020-25180 // NVD: CVE-2020-25180

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.1

problemtype:CWE-321

Trust: 1.0

problemtype:Relative past traversal (CWE-23) [IPA evaluation ]

Trust: 0.8

problemtype: Plain text storage of authentication information (CWE-256) [IPA evaluation ]

Trust: 0.8

problemtype: Sending important information in clear text (CWE-319) [IPA evaluation ]

Trust: 0.8

problemtype: Using hardcoded encryption keys (CWE-321) [IPA evaluation ]

Trust: 0.8

problemtype: Uncontrolled search path elements (CWE-427) [IPA evaluation ]

Trust: 0.8

sources: VULHUB: VHN-179133 // JVNDB: JVNDB-2021-001882 // NVD: CVE-2020-25180

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202106-529

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

PATCH

title:Xylem Product Security Advisoryurl:https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699

Trust: 0.8

title:Rockwell Automation ISaGRAF Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=153709

Trust: 0.6

sources: JVNDB: JVNDB-2021-001882 // CNNVD: CNNVD-202106-529

EXTERNAL IDS

db:NVDid:CVE-2020-25180

Trust: 3.3

db:ICS CERTid:ICSA-20-280-01

Trust: 2.5

db:SCHNEIDERid:SEVD-2021-159-04

Trust: 1.7

db:JVNid:JVNVU90811375

Trust: 0.8

db:JVNDBid:JVNDB-2021-001882

Trust: 0.8

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021120106

Trust: 0.6

db:CS-HELPid:SB2021060920

Trust: 0.6

db:AUSCERTid:ESB-2021.2163

Trust: 0.6

db:CNNVDid:CNNVD-202106-529

Trust: 0.6

db:VULHUBid:VHN-179133

Trust: 0.1

sources: VULHUB: VHN-179133 // JVNDB: JVNDB-2021-001882 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-529 // NVD: CVE-2020-25180

REFERENCES

url:https://download.schneider-electric.com/files?p_doc_ref=sevd-2021-159-04

Trust: 1.7

url:https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699

Trust: 1.7

url:https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01

Trust: 1.7

url:https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf

Trust: 1.7

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-280-01

Trust: 1.4

url:http://jvn.jp/cert/jvnvu90811375

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25176

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25178

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25180

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25182

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25184

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2163

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021060920

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2020-25180/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021120106

Trust: 0.6

sources: VULHUB: VHN-179133 // JVNDB: JVNDB-2021-001882 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-529 // NVD: CVE-2020-25180

CREDITS

Kaspersky reported these vulnerabilities to Rockwell Automation.

Trust: 0.6

sources: CNNVD: CNNVD-202106-529

SOURCES

db:VULHUBid:VHN-179133
db:JVNDBid:JVNDB-2021-001882
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202106-529
db:NVDid:CVE-2020-25180

LAST UPDATE DATE

2024-08-14T13:09:36.925000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-179133date:2022-04-04T00:00:00
db:JVNDBid:JVNDB-2021-001882date:2024-06-20T08:49:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202106-529date:2022-04-06T00:00:00
db:NVDid:CVE-2020-25180date:2022-04-04T20:59:49.830

SOURCES RELEASE DATE

db:VULHUBid:VHN-179133date:2022-03-18T00:00:00
db:JVNDBid:JVNDB-2021-001882date:2021-06-11T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202106-529date:2021-06-08T00:00:00
db:NVDid:CVE-2020-25180date:2022-03-18T18:15:09.187