ID

VAR-202207-1551


CVE

CVE-2022-2465


TITLE

Rockwell Automation  of  ISaGRAF Workbench  Untrusted Data Deserialization Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-015409

DESCRIPTION

Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Deserialization of Untrusted Data vulnerability. ISaGRAF Workbench does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in ISaGRAF Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited. (DoS) It may be in a state. Rockwell Automation ISaGRAF Workbench

Trust: 1.8

sources: NVD: CVE-2022-2465 // JVNDB: JVNDB-2022-015409 // VULHUB: VHN-427809 // VULMON: CVE-2022-2465

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:isagraf workbenchscope:lteversion:6.6.9

Trust: 1.0

vendor:rockwellautomationmodel:isagraf workbenchscope:gteversion:6.0

Trust: 1.0

vendor:rockwell automationmodel:isagraf workbenchscope:eqversion: -

Trust: 0.8

vendor:rockwell automationmodel:isagraf workbenchscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:isagraf workbenchscope:eqversion:6.0 to 6.6.9

Trust: 0.8

sources: JVNDB: JVNDB-2022-015409 // NVD: CVE-2022-2465

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-2465
value: HIGH

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-2465
value: HIGH

Trust: 1.0

NVD: CVE-2022-2465
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202207-2127
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-2465
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-2465
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2022-2465
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-015409 // CNNVD: CNNVD-202207-2127 // NVD: CVE-2022-2465 // NVD: CVE-2022-2465

PROBLEMTYPE DATA

problemtype:CWE-502

Trust: 1.1

problemtype:Deserialization of untrusted data (CWE-502) [ others ]

Trust: 0.8

sources: VULHUB: VHN-427809 // JVNDB: JVNDB-2022-015409 // NVD: CVE-2022-2465

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202207-2127

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202207-2127

PATCH

title:Rockwell Automation ISaGRAF Workbench Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=201003

Trust: 0.6

sources: CNNVD: CNNVD-202207-2127

EXTERNAL IDS

db:NVDid:CVE-2022-2465

Trust: 3.4

db:ICS CERTid:ICSA-22-202-03

Trust: 2.6

db:JVNid:JVNVU95712880

Trust: 0.8

db:JVNDBid:JVNDB-2022-015409

Trust: 0.8

db:AUSCERTid:ESB-2022.3567

Trust: 0.6

db:CS-HELPid:SB2022072218

Trust: 0.6

db:CNNVDid:CNNVD-202207-2127

Trust: 0.6

db:VULHUBid:VHN-427809

Trust: 0.1

db:VULMONid:CVE-2022-2465

Trust: 0.1

sources: VULHUB: VHN-427809 // VULMON: CVE-2022-2465 // JVNDB: JVNDB-2022-015409 // CNNVD: CNNVD-202207-2127 // NVD: CVE-2022-2465

REFERENCES

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03

Trust: 2.6

url:https://jvn.jp/vu/jvnvu95712880/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-2465

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-2465/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-202-03

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3567

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072218

Trust: 0.6

sources: VULHUB: VHN-427809 // VULMON: CVE-2022-2465 // JVNDB: JVNDB-2022-015409 // CNNVD: CNNVD-202207-2127 // NVD: CVE-2022-2465

CREDITS

Mashav Sapir of Claroty Research reported these vulnerabilities to Rockwell Automation and CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202207-2127

SOURCES

db:VULHUBid:VHN-427809
db:VULMONid:CVE-2022-2465
db:JVNDBid:JVNDB-2022-015409
db:CNNVDid:CNNVD-202207-2127
db:NVDid:CVE-2022-2465

LAST UPDATE DATE

2024-08-14T13:53:10.560000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-427809date:2022-08-27T00:00:00
db:JVNDBid:JVNDB-2022-015409date:2023-09-26T08:28:00
db:CNNVDid:CNNVD-202207-2127date:2022-08-29T00:00:00
db:NVDid:CVE-2022-2465date:2022-08-27T03:30:06.010

SOURCES RELEASE DATE

db:VULHUBid:VHN-427809date:2022-08-25T00:00:00
db:JVNDBid:JVNDB-2022-015409date:2023-09-26T00:00:00
db:CNNVDid:CNNVD-202207-2127date:2022-07-21T00:00:00
db:NVDid:CVE-2022-2465date:2022-08-25T18:15:10.223