CVE-2020-12001
Summary
| CVE | CVE-2020-12001 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-06-15 20:15:00 UTC |
| Updated | 2021-11-04 17:40:00 UTC |
| Description | FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later, Studio 5000 Launcher: Version 31 and later Stud, 5000 Logix Designer software: Version 32 and prior is vulnerable. The parsing mechanism that processes certain file types does not provide input sanitation. This may allow an attacker to use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Rockwellautomation | Factorytalk Linx | 6.00 | All | All | All |
| Application | Rockwellautomation | Factorytalk Linx | 6.10 | All | All | All |
| Application | Rockwellautomation | Factorytalk Linx | 6.11 | All | All | All |
| Application | Rockwellautomation | Factorytalk Linx | 6.00 | All | All | All |
| Application | Rockwellautomation | Factorytalk Linx | 6.10 | All | All | All |
| Application | Rockwellautomation | Factorytalk Linx | 6.11 | All | All | All |
| Application | Rockwellautomation | Rslinx Classic | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ZDI-20-733 | Zero Day Initiative | MISC | www.zerodayinitiative.com | Third Party Advisory |
| Rockwell Automation FactoryTalk Linx Software | CISA | MISC | www.us-cert.gov | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.