An unauthenticated remote attacker can send data to RsvcHost.exe listening on TCP port 5241 to add entries in the FactoryTalk Diagnostics event log. The attacker can specify long fields in the log entry, which can cause an unhandled exception in wcscpy_s() if a local user opens FactoryTalk Diagnostics Viewer (FTDiagViewer.exe) to view the log entry. Observed in FactoryTalk Diagnostics 6.11. All versions of FactoryTalk Diagnostics are affected.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2020-71 | Third Party Advisory |
https://www.tenable.com/security/research/tra-2020-71 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2020-71 - Third Party Advisory |
Information
Published : 2020-12-29 16:15
Updated : 2024-11-21 05:34
NVD link : CVE-2020-5807
Mitre link : CVE-2020-5807
CVE.ORG link : CVE-2020-5807
JSON object : View
Products Affected
rockwellautomation
- factorytalk_diagnostics
CWE
CWE-755
Improper Handling of Exceptional Conditions