CVE-2022-1118

Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploited
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rockwellautomation:connected_component_workbench:*:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:isagraf_workbench:*:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:safety_instrumented_systems_workstation:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-05-17 20:15

Updated : 2024-02-28 19:09


NVD link : CVE-2022-1118

Mitre link : CVE-2022-1118

CVE.ORG link : CVE-2022-1118


JSON object : View

Products Affected

rockwellautomation

  • safety_instrumented_systems_workstation
  • connected_component_workbench
  • isagraf_workbench
CWE
CWE-502

Deserialization of Untrusted Data