CVE-2020-25176

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:schneider-electric:easergy_c5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:easergy_c5:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:schneider-electric:micom_c264_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:micom_c264:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.1:*:*:*:*:windows:*:*
cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.2:*:*:*:*:windows:*:*
cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.1:*:*:*:*:windows:*:*
cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:linux:*:*
cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:windows:*:*
cpe:2.3:h:schneider-electric:pacis_gtw:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:schneider-electric:saitel_dp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:saitel_dp:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
OR cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:linux:*:*
cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:windows:*:*
cpe:2.3:h:schneider-electric:epas_gtw:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:schneider-electric:saitel_dr_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:saitel_dr:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:schneider-electric:scd2200_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:schneider-electric:cp-3:-:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:mc-31:-:*:*:*:*:*:*:*

Configuration 9 (hide)

OR cpe:2.3:a:rockwellautomation:aadvance_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:isagraf_free_runtime:*:*:*:*:*:isagraf6_workbench:*:*
cpe:2.3:a:rockwellautomation:isagraf_runtime:*:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:rockwellautomation:micro810_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:micro810:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:rockwellautomation:micro820_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:micro820:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:rockwellautomation:micro830_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:micro830:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:rockwellautomation:micro850_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:micro850:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:rockwellautomation:micro870_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:micro870:-:*:*:*:*:*:*:*

Configuration 15 (hide)

cpe:2.3:o:xylem:multismart_firmware:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:17

Type Values Removed Values Added
CVSS v2 : 9.3
v3 : 9.8
v2 : 9.3
v3 : 9.1
References () https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04 - Mitigation, Vendor Advisory () https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04 - Mitigation, Vendor Advisory
References () https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699 - Permissions Required () https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699 - Permissions Required
References () https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01 - Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01 - Third Party Advisory, US Government Resource
References () https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf - Third Party Advisory () https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf - Third Party Advisory

Information

Published : 2022-03-18 18:15

Updated : 2024-11-21 05:17


NVD link : CVE-2020-25176

Mitre link : CVE-2020-25176

CVE.ORG link : CVE-2020-25176


JSON object : View

Products Affected

rockwellautomation

  • micro810_firmware
  • aadvance_controller
  • isagraf_free_runtime
  • micro870_firmware
  • micro830_firmware
  • micro850_firmware
  • micro850
  • micro830
  • micro870
  • micro820_firmware
  • isagraf_runtime
  • micro820
  • micro810

schneider-electric

  • epas_gtw_firmware
  • cp-3
  • mc-31
  • easergy_c5_firmware
  • pacis_gtw_firmware
  • easergy_t300
  • saitel_dp_firmware
  • easergy_t300_firmware
  • micom_c264_firmware
  • micom_c264
  • pacis_gtw
  • saitel_dp
  • scd2200_firmware
  • saitel_dr
  • epas_gtw
  • saitel_dr_firmware
  • easergy_c5

xylem

  • multismart_firmware
CWE
CWE-23

Relative Path Traversal

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')