CVE-2020-12003
Summary
| CVE | CVE-2020-12003 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-06-15 20:15:00 UTC |
| Updated | 2020-06-24 15:28:00 UTC |
| Description | FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later, Studio 5000 Launcher: Version 31 and later Stud, 5000 Logix Designer software: Version 32 and prior is vulnerable. An exposed API call allows users to provide files to be processed without sanitation. This may allow an attacker to use specially crafted requests to traverse the file system and expose sensitive data on the local hard drive. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Rockwellautomation | Factorytalk Linx | 6.00 | All | All | All |
| Application | Rockwellautomation | Factorytalk Linx | 6.10 | All | All | All |
| Application | Rockwellautomation | Factorytalk Linx | 6.11 | All | All | All |
| Application | Rockwellautomation | Factorytalk Linx | 6.00 | All | All | All |
| Application | Rockwellautomation | Factorytalk Linx | 6.10 | All | All | All |
| Application | Rockwellautomation | Factorytalk Linx | 6.11 | All | All | All |
| Application | Rockwellautomation | Rslinx Classic | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Rockwell Automation FactoryTalk Linx Software | CISA | MISC | www.us-cert.gov | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.