CVE-2022-1118

Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploited
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01 Third Party Advisory US Government Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rockwellautomation:connected_component_workbench:*:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:isagraf_workbench:*:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:safety_instrumented_systems_workstation:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:40

Type Values Removed Values Added
References () https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01 - Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01 - Third Party Advisory, US Government Resource
CVSS v2 : 6.8
v3 : 7.8
v2 : 6.8
v3 : 8.6

Information

Published : 2022-05-17 20:15

Updated : 2024-11-21 06:40


NVD link : CVE-2022-1118

Mitre link : CVE-2022-1118

CVE.ORG link : CVE-2022-1118


JSON object : View

Products Affected

rockwellautomation

  • connected_component_workbench
  • isagraf_workbench
  • safety_instrumented_systems_workstation
CWE
CWE-502

Deserialization of Untrusted Data