CVE-2020-25178

Summary

CVECVE-2020-25178
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-03-18 18:15:00 UTC
Updated2022-04-04 20:57:00 UTC
DescriptionISaGRAF Workbench communicates with Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x using TCP/IP. This communication protocol provides various file system operations, as well as the uploading of applications. Data is transferred over this protocol unencrypted, which could allow a remote unauthenticated attacker to upload, read, and delete files.

Risk And Classification

Problem Types: CWE-319

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Rockwellautomation Aadvance Controller All All All All
Application Rockwellautomation Isagraf Free Runtime All All All All
Application Rockwellautomation Isagraf Runtime All All All All
Hardware Rockwellautomation Micro810 - All All All
Operating System Rockwellautomation Micro810 Firmware - All All All
Hardware Rockwellautomation Micro820 - All All All
Operating System Rockwellautomation Micro820 Firmware - All All All
Hardware Rockwellautomation Micro830 - All All All
Operating System Rockwellautomation Micro830 Firmware - All All All
Hardware Rockwellautomation Micro850 - All All All
Operating System Rockwellautomation Micro850 Firmware - All All All
Hardware Rockwellautomation Micro870 - All All All
Operating System Rockwellautomation Micro870 Firmware - All All All
Hardware Schneider-electric Cp-3 - All All All
Hardware Schneider-electric Easergy C5 - All All All
Operating System Schneider-electric Easergy C5 Firmware All All All All
Hardware Schneider-electric Easergy T300 - All All All
Operating System Schneider-electric Easergy T300 Firmware All All All All
Hardware Schneider-electric Epas Gtw - All All All
Operating System Schneider-electric Epas Gtw Firmware 6.4 All All All
Operating System Schneider-electric Epas Gtw Firmware 6.4 All All All
Hardware Schneider-electric Mc-31 - All All All
Hardware Schneider-electric Micom C264 - All All All
Operating System Schneider-electric Micom C264 Firmware All All All All
Hardware Schneider-electric Pacis Gtw - All All All
Operating System Schneider-electric Pacis Gtw Firmware 5.1 All All All
Operating System Schneider-electric Pacis Gtw Firmware 5.2 All All All
Operating System Schneider-electric Pacis Gtw Firmware 6.1 All All All
Operating System Schneider-electric Pacis Gtw Firmware 6.3 All All All
Operating System Schneider-electric Pacis Gtw Firmware 6.3 All All All
Hardware Schneider-electric Saitel Dp - All All All
Operating System Schneider-electric Saitel Dp Firmware All All All All
Hardware Schneider-electric Saitel Dr - All All All
Operating System Schneider-electric Saitel Dr Firmware All All All All
Operating System Schneider-electric Scd2200 Firmware All All All All
Operating System Xylem Multismart Firmware All All All All

References

ReferenceSourceLinkTags
www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multism... CONFIRM www.xylem.com
download.schneider-electric.com/files CONFIRM download.schneider-electric.com
Rockwell Automation ISaGRAF5 Runtime (Update A) | CISA CONFIRM www.cisa.gov
Sign In CONFIRM rockwellautomation.custhelp.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

Discovery Credit

LEGACY: Kaspersky reported these vulnerabilities to Rockwell Automation.

Legacy QID Mappings

  • 590729 Rockwell Automation ISaGRAF5 Runtime Multiple Vulnerabilities (ICSA-20-280-01)
  • 590781 Rockwell Automation AADvance Controller and Micro800 family Multiple Vulnerabilities (ICSA-20-280-01)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report