Show filters
273 Total Results
Displaying 101-110 of 273
Sort by:
Attacker Value
Unknown
CVE-2022-2464
Disclosure Date: August 25, 2022 (last updated February 24, 2025)
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. Crafted malicious files can allow an attacker to traverse the file system when opened by ISaGRAF Workbench. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the ISaGRAF Workbench software. User interaction is required for this exploit to be successful.
0
Attacker Value
Unknown
CVE-2022-2463
Disclosure Date: August 25, 2022 (last updated February 24, 2025)
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. A crafted malicious .7z exchange file may allow an attacker to gain the privileges of the ISaGRAF Workbench software when opened. If the software is running at the SYSTEM level, then the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.
0
Attacker Value
Unknown
CVE-2020-6998
Disclosure Date: July 27, 2022 (last updated February 24, 2025)
The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop. This may allow an attacker to send specially crafted CIP packet requests to a controller, which may cause denial-of-service conditions in communications with other products.
0
Attacker Value
Unknown
CVE-2022-2179
Disclosure Date: July 19, 2022 (last updated February 24, 2025)
The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks.
0
Attacker Value
Unknown
CVE-2022-1797
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online.
0
Attacker Value
Unknown
CVE-2022-1118
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploited
0
Attacker Value
Unknown
CVE-2022-1159
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user.
0
Attacker Value
Unknown
CVE-2021-32960
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine.
0
Attacker Value
Unknown
CVE-2022-1161
Disclosure Date: March 31, 2022 (last updated February 23, 2025)
An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change one and not the other.
0
Attacker Value
Unknown
CVE-2022-1018
Disclosure Date: March 29, 2022 (last updated February 23, 2025)
When opening a malicious solution file provided by an attacker, the application suffers from an XML external entity vulnerability due to an unsafe call within a dynamic link library file. An attacker could exploit this to pass data from local files to a remote web server, leading to a loss of confidentiality.
0