Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploited
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.6 |
Information
Published : 2022-05-17 20:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1118
Mitre link : CVE-2022-1118
CVE.ORG link : CVE-2022-1118
JSON object : View
Products Affected
rockwellautomation
- connected_component_workbench
- isagraf_workbench
- safety_instrumented_systems_workstation
CWE
CWE-502
Deserialization of Untrusted Data