Rockwell Automation DriveTools SP v5.13 and below and Drives AOP v4.12 and below both contain a vulnerability that a local attacker with limited privileges may be able to exploit resulting in privilege escalation and complete control of the system.
References
Link | Resource |
---|---|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1129798 | Permissions Required Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-042-02 | Third Party Advisory US Government Resource |
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1129798 | Permissions Required Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-042-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1129798 - Permissions Required, Vendor Advisory | |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-042-02 - Third Party Advisory, US Government Resource |
Information
Published : 2021-03-18 18:15
Updated : 2024-11-21 05:50
NVD link : CVE-2021-22665
Mitre link : CVE-2021-22665
CVE.ORG link : CVE-2021-22665
JSON object : View
Products Affected
rockwellautomation
- drivetools_add-on_profiles
- drivetools_sp
CWE
CWE-427
Uncontrolled Search Path Element