Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-6015 (GCVE-0-2017-6015)
Vulnerability from cvelistv5
- CWE-428 - Unquoted search path or element
| URL | Tags | ||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Rockwell Automation | FactoryTalk Activation |
Version: FactoryTalk Activation Service, Version 4.00.02 and prior versions. |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:18:49.328Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "96996",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/96996"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "FactoryTalk Activation",
"vendor": "Rockwell Automation",
"versions": [
{
"status": "affected",
"version": "FactoryTalk Activation Service, Version 4.00.02 and prior versions."
}
]
}
],
"datePublic": "2017-03-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-428",
"description": "Unquoted search path or element CWE-428",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-05-12T09:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"name": "96996",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/96996"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2017-03-21T00:00:00",
"ID": "CVE-2017-6015",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "FactoryTalk Activation",
"version": {
"version_data": [
{
"version_value": "FactoryTalk Activation Service, Version 4.00.02 and prior versions."
}
]
}
}
]
},
"vendor_name": "Rockwell Automation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Unquoted search path or element CWE-428"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "96996",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96996"
},
{
"name": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382",
"refsource": "MISC",
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2017-6015",
"datePublished": "2018-05-11T13:00:00Z",
"dateReserved": "2017-02-16T00:00:00",
"dateUpdated": "2024-09-16T21:07:54.228Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2017-6015\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2018-05-11T13:29:00.297\",\"lastModified\":\"2024-11-21T03:28:54.360\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later.\"},{\"lang\":\"es\",\"value\":\"Sin comillas, cualquier espacio en blanco en la ruta de archivo de Rockwell Automation FactoryTalk Activation 4.00.02 se mantiene ambiguo. Esto puede permitir que un atacante vincule o ejecute un archivo malicioso. Esto puede permitir que un usuario local autorizado sin privilegios ejecute c\u00f3digo arbitrario con privilegios elevados en el sistema. Puntuaci\u00f3n base de CVSS v3: 8.8, cadena de vector CVSS: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation ha lanzado una nueva versi\u00f3n de FactoryTalk Activation, versi\u00f3n 4.01, que aborda esta vulnerabilidad identificada. Rockwell Automation recomienda actualizar a la \u00faltima versi\u00f3n de FactoryTalk Activation, la 4.01 o posteriores.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-428\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-74\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:factorytalk_activation:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.00.02\",\"matchCriteriaId\":\"175856ED-7BC9-459A-B3C5-E71CC791DA1E\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/96996\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/96996\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]}]}}"
}
}
ICSA-17-047-02
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Rockwell Automation",
"summary": "reporting the vulnerability"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "REPOSTED INFORMATION",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Chemical, Critical Manufacturing, Food and Agriculture, Water and Wastewater Systems",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Milwaukee, Wisconsin",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target this vulnerability. This vulnerability is not remotely exploitable.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-17-047-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsa-17-047-02.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-17-047-02 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-047-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-047-02"
}
],
"title": "Rockwell Automation FactoryTalk Activation",
"tracking": {
"current_release_date": "2017-03-21T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-17-047-02",
"initial_release_date": "2017-02-16T00:00:00.000000Z",
"revision_history": [
{
"date": "2017-02-16T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-17-047-02P Rockwell Automation FactoryTalk Activation"
},
{
"date": "2017-03-21T00:00:00.000000Z",
"legacy_version": "A",
"number": "2",
"summary": "ICSA-17-047-02 Rockwell Automation FactoryTalk Activation (Update A)"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "SoftLogix 5800 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SoftLogix 5800 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSLinx Classic FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "RSLinx Classic FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk eProcedure FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "FactoryTalk eProcedure FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSLogix 500 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "RSLogix 500 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk View Site Edition (SE) FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "FactoryTalk View Site Edition (SE) FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSNetWorx FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "RSNetWorx FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSLogix Emulate 5000 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "RSLogix Emulate 5000 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSLogix 5 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "RSLogix 5 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Information Server FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "FactoryTalk Information Server FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Studio 5000 Logix Emulate FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00010"
}
}
],
"category": "product_name",
"name": "Studio 5000 Logix Emulate FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk ViewPoint FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00011"
}
}
],
"category": "product_name",
"name": "FactoryTalk ViewPoint FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Arena FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00012"
}
}
],
"category": "product_name",
"name": "Arena FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Historian Site Edition (SE) FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00013"
}
}
],
"category": "product_name",
"name": "FactoryTalk Historian Site Edition (SE) FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk AssetCentre FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00014"
}
}
],
"category": "product_name",
"name": "FactoryTalk AssetCentre FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Batch FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00015"
}
}
],
"category": "product_name",
"name": "FactoryTalk Batch FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSLogix 5000 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00016"
}
}
],
"category": "product_name",
"name": "RSLogix 5000 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Emonitor FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00017"
}
}
],
"category": "product_name",
"name": "Emonitor FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Studio 5000 Architect FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00018"
}
}
],
"category": "product_name",
"name": "Studio 5000 Architect FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Gateway FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00019"
}
}
],
"category": "product_name",
"name": "FactoryTalk Gateway FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk EnergyMetrix FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00020"
}
}
],
"category": "product_name",
"name": "FactoryTalk EnergyMetrix FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Metrics FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00021"
}
}
],
"category": "product_name",
"name": "FactoryTalk Metrics FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Transaction Manager FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00022"
}
}
],
"category": "product_name",
"name": "FactoryTalk Transaction Manager FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk VantagePoint FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00023"
}
}
],
"category": "product_name",
"name": "FactoryTalk VantagePoint FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Historian Classic FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00024"
}
}
],
"category": "product_name",
"name": "FactoryTalk Historian Classic FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSView32 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00025"
}
}
],
"category": "product_name",
"name": "RSView32 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00026"
}
}
],
"category": "product_name",
"name": "FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSFieldBus FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00027"
}
}
],
"category": "product_name",
"name": "RSFieldBus FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Studio 5000 Logix Designer FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00028"
}
}
],
"category": "product_name",
"name": "Studio 5000 Logix Designer FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Studio 5000 View Designer FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00029"
}
}
],
"category": "product_name",
"name": "Studio 5000 View Designer FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk View Machine Edition (ME) FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00030"
}
}
],
"category": "product_name",
"name": "FactoryTalk View Machine Edition (ME) FactoryTalk Activation Service"
}
],
"category": "vendor",
"name": "Rockwell Automation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-6015",
"cwe": {
"id": "CWE-428",
"name": "Unquoted Search Path or Element"
},
"notes": [
{
"category": "summary",
"text": "Without quotation marks, any whitespace in the file path remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system.CVE-2017-6015 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6015"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later, which is available at the following location:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
],
"url": "http://compatibility.rockwellautomation.com/Pages/MultiProductFindDownloads.aspx?crumb=112\u0026mode=3\u0026refSoft=1\u0026versions=54269%20"
},
{
"category": "mitigation",
"details": "If unable to upgrade to the latest version, users should read Knowledgebase Article KB939382, which describes how to identify whether the service path contains spaces (i.e., is vulnerable); how to manually address this vulnerability through a registry edit; and the article describes the process of doing such edits.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
},
{
"category": "mitigation",
"details": "Rockwell Automation\u0027s Knowledgebase Article KB939382 is available at the following location:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382"
},
{
"category": "mitigation",
"details": "Rockwell Automation recommends, where feasible, the precautions and risk mitigation strategies to this type of attack, like those listed below.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
},
{
"category": "mitigation",
"details": "Follow industry best-practices to harden PCs and servers, including antivirus/anti-malware and application whitelisting solutions. These recommendations are published in Knowledgebase Article KB546987, which is available at the following location:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/546987"
},
{
"category": "mitigation",
"details": "Use trusted software, software patches, antivirus/anti-malware programs, and interact only with trusted web sites and attachments.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
},
{
"category": "mitigation",
"details": "Employ training and awareness programs to educate users on the warning signs of a phishing or social engineering attack.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
}
]
}
]
}
icsa-17-047-02
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Rockwell Automation",
"summary": "reporting the vulnerability"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "REPOSTED INFORMATION",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Chemical, Critical Manufacturing, Food and Agriculture, Water and Wastewater Systems",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Milwaukee, Wisconsin",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target this vulnerability. This vulnerability is not remotely exploitable.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-17-047-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsa-17-047-02.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-17-047-02 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-047-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-047-02"
}
],
"title": "Rockwell Automation FactoryTalk Activation",
"tracking": {
"current_release_date": "2017-03-21T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-17-047-02",
"initial_release_date": "2017-02-16T00:00:00.000000Z",
"revision_history": [
{
"date": "2017-02-16T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-17-047-02P Rockwell Automation FactoryTalk Activation"
},
{
"date": "2017-03-21T00:00:00.000000Z",
"legacy_version": "A",
"number": "2",
"summary": "ICSA-17-047-02 Rockwell Automation FactoryTalk Activation (Update A)"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "SoftLogix 5800 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SoftLogix 5800 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSLinx Classic FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "RSLinx Classic FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk eProcedure FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "FactoryTalk eProcedure FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSLogix 500 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "RSLogix 500 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk View Site Edition (SE) FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "FactoryTalk View Site Edition (SE) FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSNetWorx FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "RSNetWorx FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSLogix Emulate 5000 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "RSLogix Emulate 5000 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSLogix 5 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "RSLogix 5 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Information Server FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "FactoryTalk Information Server FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Studio 5000 Logix Emulate FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00010"
}
}
],
"category": "product_name",
"name": "Studio 5000 Logix Emulate FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk ViewPoint FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00011"
}
}
],
"category": "product_name",
"name": "FactoryTalk ViewPoint FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Arena FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00012"
}
}
],
"category": "product_name",
"name": "Arena FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Historian Site Edition (SE) FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00013"
}
}
],
"category": "product_name",
"name": "FactoryTalk Historian Site Edition (SE) FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk AssetCentre FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00014"
}
}
],
"category": "product_name",
"name": "FactoryTalk AssetCentre FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Batch FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00015"
}
}
],
"category": "product_name",
"name": "FactoryTalk Batch FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSLogix 5000 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00016"
}
}
],
"category": "product_name",
"name": "RSLogix 5000 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Emonitor FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00017"
}
}
],
"category": "product_name",
"name": "Emonitor FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Studio 5000 Architect FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00018"
}
}
],
"category": "product_name",
"name": "Studio 5000 Architect FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Gateway FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00019"
}
}
],
"category": "product_name",
"name": "FactoryTalk Gateway FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk EnergyMetrix FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00020"
}
}
],
"category": "product_name",
"name": "FactoryTalk EnergyMetrix FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Metrics FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00021"
}
}
],
"category": "product_name",
"name": "FactoryTalk Metrics FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Transaction Manager FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00022"
}
}
],
"category": "product_name",
"name": "FactoryTalk Transaction Manager FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk VantagePoint FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00023"
}
}
],
"category": "product_name",
"name": "FactoryTalk VantagePoint FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Historian Classic FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00024"
}
}
],
"category": "product_name",
"name": "FactoryTalk Historian Classic FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSView32 FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00025"
}
}
],
"category": "product_name",
"name": "RSView32 FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00026"
}
}
],
"category": "product_name",
"name": "FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "RSFieldBus FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00027"
}
}
],
"category": "product_name",
"name": "RSFieldBus FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Studio 5000 Logix Designer FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00028"
}
}
],
"category": "product_name",
"name": "Studio 5000 Logix Designer FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "Studio 5000 View Designer FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00029"
}
}
],
"category": "product_name",
"name": "Studio 5000 View Designer FactoryTalk Activation Service"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.00.02",
"product": {
"name": "FactoryTalk View Machine Edition (ME) FactoryTalk Activation Service: Version 4.00.02 and prior versions",
"product_id": "CSAFPID-00030"
}
}
],
"category": "product_name",
"name": "FactoryTalk View Machine Edition (ME) FactoryTalk Activation Service"
}
],
"category": "vendor",
"name": "Rockwell Automation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-6015",
"cwe": {
"id": "CWE-428",
"name": "Unquoted Search Path or Element"
},
"notes": [
{
"category": "summary",
"text": "Without quotation marks, any whitespace in the file path remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system.CVE-2017-6015 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6015"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later, which is available at the following location:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
],
"url": "http://compatibility.rockwellautomation.com/Pages/MultiProductFindDownloads.aspx?crumb=112\u0026mode=3\u0026refSoft=1\u0026versions=54269%20"
},
{
"category": "mitigation",
"details": "If unable to upgrade to the latest version, users should read Knowledgebase Article KB939382, which describes how to identify whether the service path contains spaces (i.e., is vulnerable); how to manually address this vulnerability through a registry edit; and the article describes the process of doing such edits.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
},
{
"category": "mitigation",
"details": "Rockwell Automation\u0027s Knowledgebase Article KB939382 is available at the following location:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382"
},
{
"category": "mitigation",
"details": "Rockwell Automation recommends, where feasible, the precautions and risk mitigation strategies to this type of attack, like those listed below.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
},
{
"category": "mitigation",
"details": "Follow industry best-practices to harden PCs and servers, including antivirus/anti-malware and application whitelisting solutions. These recommendations are published in Knowledgebase Article KB546987, which is available at the following location:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/546987"
},
{
"category": "mitigation",
"details": "Use trusted software, software patches, antivirus/anti-malware programs, and interact only with trusted web sites and attachments.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
},
{
"category": "mitigation",
"details": "Employ training and awareness programs to educate users on the warning signs of a phishing or social engineering attack.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030"
]
}
]
}
]
}
cnvd-2017-05069
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02
| Name | ['Rockwell Automation FactoryTalk Activation Service 4.00.02', 'Rockwell Automation FactoryTalk Activation Service <4.00.02'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "96996"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-6015",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6015"
}
},
"description": "Rockwell Automation\u662f\u4e00\u5bb6\u9488\u5bf9\u5de5\u4e1a\u81ea\u52a8\u5316\uff0c\u63a7\u5236\u548c\u4fe1\u606f\u6280\u672f\u7684\u89e3\u51b3\u65b9\u6848\u4f9b\u5e94\u5546\u3002\r\n\r\nRockwell Automation FactoryTalk Activation\u5b58\u5728\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u4f7f\u7528SYSTEM\u6743\u9650\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Rockwell Automation",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://ics-cert.us-cert.gov/advisories/ICSA-17-047-02",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-05069",
"openTime": "2017-04-24",
"patchDescription": "Rockwell Automation\u662f\u4e00\u5bb6\u9488\u5bf9\u5de5\u4e1a\u81ea\u52a8\u5316\uff0c\u63a7\u5236\u548c\u4fe1\u606f\u6280\u672f\u7684\u89e3\u51b3\u65b9\u6848\u4f9b\u5e94\u5546\u3002\r\n\r\nRockwell Automation FactoryTalk Activation\u5b58\u5728\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u4f7f\u7528SYSTEM\u6743\u9650\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Rockwell Automation FactoryTalk Activation\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Rockwell Automation FactoryTalk Activation Service 4.00.02",
"Rockwell Automation FactoryTalk Activation Service \u003c4.00.02"
]
},
"referenceLink": "http://www.securityfocus.com/bid/96996",
"serverity": "\u4f4e",
"submitTime": "2017-03-27",
"title": "Rockwell Automation FactoryTalk Activation\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e"
}
var-201805-0119
Vulnerability from variot
Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later. Rockwell Automation FactoryTalk Activation Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Rockwell Automation is a solution provider for industrial automation, control and information technology. A local privilege elevation vulnerability exists in RockwellAutomationFactoryTalkActivation. FactoryTalk Activation Service 4.00.02 and prior are vulnerable. FactoryTalk Activation is one component used to manage application licenses
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201805-0119",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "factorytalk activation",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "4.00.02"
},
{
"model": "automation factorytalk activation service",
"scope": "eq",
"trust": 0.9,
"vendor": "rockwell",
"version": "4.00.02"
},
{
"model": "factorytalk",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "4.00.02"
},
{
"model": "automation factorytalk activation service",
"scope": "lt",
"trust": 0.6,
"vendor": "rockwell",
"version": "4.00.02"
},
{
"model": "factorytalk activation",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "4.00.02"
},
{
"model": "automation studio view designer",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "50000"
},
{
"model": "automation studio logix emulate",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "50000"
},
{
"model": "automation studio logix designer",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "50000"
},
{
"model": "automation studio architect",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "50000"
},
{
"model": "automation softlogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "58000"
},
{
"model": "automation rsview32",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation rsnetworx",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation rslogix emulate",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "50000"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "50000"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "5000"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "50"
},
{
"model": "automation rslinx classic",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation rsfieldbus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation rockarena",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk viewpoint",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk view site edition",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk view machine edition",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk vantagepoint",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk metrics",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk information server",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk historian site edition",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk historian classic",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk eprocedure",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk energymetrix",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk batch",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk assetcentre",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation emonitor",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "automation factorytalk activation service",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "4.01"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "factorytalk activation",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec"
},
{
"db": "CNVD",
"id": "CNVD-2017-05069"
},
{
"db": "BID",
"id": "96996"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-013404"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-597"
},
{
"db": "NVD",
"id": "CVE-2017-6015"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:rockwellautomation:factorytalk",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-013404"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "96996"
}
],
"trust": 0.3
},
"cve": "CVE-2017-6015",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2017-6015",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.4,
"id": "CNVD-2017-05069",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.4,
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 0.2,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-114218",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2017-6015",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-6015",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2017-6015",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-05069",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-201702-597",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-114218",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec"
},
{
"db": "CNVD",
"id": "CNVD-2017-05069"
},
{
"db": "VULHUB",
"id": "VHN-114218"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-013404"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-597"
},
{
"db": "NVD",
"id": "CVE-2017-6015"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later. Rockwell Automation FactoryTalk Activation Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Rockwell Automation is a solution provider for industrial automation, control and information technology. A local privilege elevation vulnerability exists in RockwellAutomationFactoryTalkActivation. \nFactoryTalk Activation Service 4.00.02 and prior are vulnerable. FactoryTalk Activation is one component used to manage application licenses",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-6015"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-013404"
},
{
"db": "CNVD",
"id": "CNVD-2017-05069"
},
{
"db": "BID",
"id": "96996"
},
{
"db": "IVD",
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec"
},
{
"db": "VULHUB",
"id": "VHN-114218"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-6015",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-047-02",
"trust": 2.8
},
{
"db": "BID",
"id": "96996",
"trust": 2.6
},
{
"db": "CNNVD",
"id": "CNNVD-201702-597",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-05069",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-013404",
"trust": 0.8
},
{
"db": "IVD",
"id": "5F92208A-6F8A-474A-BD93-87AF91DB32EC",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-114218",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec"
},
{
"db": "CNVD",
"id": "CNVD-2017-05069"
},
{
"db": "VULHUB",
"id": "VHN-114218"
},
{
"db": "BID",
"id": "96996"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-013404"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-597"
},
{
"db": "NVD",
"id": "CVE-2017-6015"
}
]
},
"id": "VAR-201805-0119",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec"
},
{
"db": "CNVD",
"id": "CNVD-2017-05069"
},
{
"db": "VULHUB",
"id": "VHN-114218"
}
],
"trust": 1.6586580116666667
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec"
},
{
"db": "CNVD",
"id": "CNVD-2017-05069"
}
]
},
"last_update_date": "2024-11-23T23:05:07.707000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.rockwellautomation.com/"
},
{
"title": "RockwellAutomationFactoryTalkActivation Local Privilege Escalation Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/92373"
},
{
"title": "Rockwell Automation FactoryTalk Activation Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99649"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05069"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-013404"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-597"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-74",
"trust": 1.1
},
{
"problemtype": "CWE-428",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114218"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-013404"
},
{
"db": "NVD",
"id": "CVE-2017-6015"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-047-02"
},
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/96996"
},
{
"trust": 1.7,
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6015"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6015"
},
{
"trust": 0.3,
"url": "http://www.rockwellautomation.com/"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-047-02 "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05069"
},
{
"db": "VULHUB",
"id": "VHN-114218"
},
{
"db": "BID",
"id": "96996"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-013404"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-597"
},
{
"db": "NVD",
"id": "CVE-2017-6015"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec"
},
{
"db": "CNVD",
"id": "CNVD-2017-05069"
},
{
"db": "VULHUB",
"id": "VHN-114218"
},
{
"db": "BID",
"id": "96996"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-013404"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-597"
},
{
"db": "NVD",
"id": "CVE-2017-6015"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-22T00:00:00",
"db": "IVD",
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec"
},
{
"date": "2017-04-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05069"
},
{
"date": "2018-05-11T00:00:00",
"db": "VULHUB",
"id": "VHN-114218"
},
{
"date": "2017-03-21T00:00:00",
"db": "BID",
"id": "96996"
},
{
"date": "2018-07-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-013404"
},
{
"date": "2017-02-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201702-597"
},
{
"date": "2018-05-11T13:29:00.297000",
"db": "NVD",
"id": "CVE-2017-6015"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05069"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-114218"
},
{
"date": "2017-03-23T00:01:00",
"db": "BID",
"id": "96996"
},
{
"date": "2018-07-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-013404"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201702-597"
},
{
"date": "2024-11-21T03:28:54.360000",
"db": "NVD",
"id": "CVE-2017-6015"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "96996"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-597"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell Automation FactoryTalk Activation Local Privilege Escalation Vulnerability",
"sources": [
{
"db": "IVD",
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec"
},
{
"db": "CNVD",
"id": "CNVD-2017-05069"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "injection",
"sources": [
{
"db": "IVD",
"id": "5f92208a-6f8a-474a-bd93-87af91db32ec"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-597"
}
],
"trust": 0.8
}
}
ghsa-rfr4-xxfq-6j5j
Vulnerability from github
Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later.
{
"affected": [],
"aliases": [
"CVE-2017-6015"
],
"database_specific": {
"cwe_ids": [
"CWE-74"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-05-11T13:29:00Z",
"severity": "HIGH"
},
"details": "Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later.",
"id": "GHSA-rfr4-xxfq-6j5j",
"modified": "2022-05-13T01:36:36Z",
"published": "2022-05-13T01:36:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6015"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02"
},
{
"type": "WEB",
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/96996"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
fkie_cve-2017-6015
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/96996 | Third Party Advisory, VDB Entry | |
| ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02 | Third Party Advisory, US Government Resource | |
| ics-cert@hq.dhs.gov | https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382 | Permissions Required, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96996 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382 | Permissions Required, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| rockwellautomation | factorytalk_activation | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockwellautomation:factorytalk_activation:*:*:*:*:*:*:*:*",
"matchCriteriaId": "175856ED-7BC9-459A-B3C5-E71CC791DA1E",
"versionEndIncluding": "4.00.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later."
},
{
"lang": "es",
"value": "Sin comillas, cualquier espacio en blanco en la ruta de archivo de Rockwell Automation FactoryTalk Activation 4.00.02 se mantiene ambiguo. Esto puede permitir que un atacante vincule o ejecute un archivo malicioso. Esto puede permitir que un usuario local autorizado sin privilegios ejecute c\u00f3digo arbitrario con privilegios elevados en el sistema. Puntuaci\u00f3n base de CVSS v3: 8.8, cadena de vector CVSS: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation ha lanzado una nueva versi\u00f3n de FactoryTalk Activation, versi\u00f3n 4.01, que aborda esta vulnerabilidad identificada. Rockwell Automation recomienda actualizar a la \u00faltima versi\u00f3n de FactoryTalk Activation, la 4.01 o posteriores."
}
],
"id": "CVE-2017-6015",
"lastModified": "2024-11-21T03:28:54.360",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-05-11T13:29:00.297",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96996"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96996"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-428"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-74"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2017-6015
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2017-6015",
"description": "Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later.",
"id": "GSD-2017-6015"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-6015"
],
"details": "Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later.",
"id": "GSD-2017-6015",
"modified": "2023-12-13T01:21:09.506587Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2017-03-21T00:00:00",
"ID": "CVE-2017-6015",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "FactoryTalk Activation",
"version": {
"version_data": [
{
"version_value": "FactoryTalk Activation Service, Version 4.00.02 and prior versions."
}
]
}
}
]
},
"vendor_name": "Rockwell Automation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Unquoted search path or element CWE-428"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "96996",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96996"
},
{
"name": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382",
"refsource": "MISC",
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:factorytalk_activation:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.00.02",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2017-6015"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382",
"refsource": "MISC",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/939382"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02"
},
{
"name": "96996",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96996"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-10-09T23:28Z",
"publishedDate": "2018-05-11T13:29Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.