Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-27255 (GCVE-0-2020-27255)
Vulnerability from cvelistv5
- CWE-122 - HEAP-BASED BUFFER OVERFLOW
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | FactoryTalk Linx |
Version: Version 6.11 and prior |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:11:36.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FactoryTalk Linx", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Version 6.11 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "HEAP-BASED BUFFER OVERFLOW CWE-122", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-26T01:38:44", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-27255", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FactoryTalk Linx", "version": { "version_data": [ { "version_value": "Version 6.11 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "HEAP-BASED BUFFER OVERFLOW CWE-122" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-27255", "datePublished": "2020-11-26T01:38:44", "dateReserved": "2020-10-19T00:00:00", "dateUpdated": "2024-08-04T16:11:36.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-27255\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2020-11-26T02:15:12.243\",\"lastModified\":\"2024-11-21T05:20:57.113\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR).\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de desbordamiento de la pila en FactoryTalk Linx versiones 6.11 y anteriores.\u0026#xa0;Esta vulnerabilidad podr\u00eda permitir a un atacante remoto no autenticado enviar peticiones de atributos de configuraci\u00f3n maliciosos, lo que podr\u00eda resultar en un filtrado de informaci\u00f3n confidencial.\u0026#xa0;Esta divulgaci\u00f3n de informaci\u00f3n podr\u00eda conllevar a una omisi\u00f3n de la aleatorizaci\u00f3n del dise\u00f1o de espacio de direcciones (ASLR)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:factorytalk_linx:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.11\",\"matchCriteriaId\":\"89622117-4485-4204-A5DA-B72F7F13D353\"}]}]}],\"references\":[{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
gsd-2020-27255
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-27255", "description": "A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR).", "id": "GSD-2020-27255" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-27255" ], "details": "A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR).", "id": "GSD-2020-27255", "modified": "2023-12-13T01:22:11.309299Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-27255", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FactoryTalk Linx", "version": { "version_data": [ { "version_value": "Version 6.11 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "HEAP-BASED BUFFER OVERFLOW CWE-122" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rockwellautomation:factorytalk_linx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.11", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-27255" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-122" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01", "refsource": "MISC", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2020-11-30T19:33Z", "publishedDate": "2020-11-26T02:15Z" } } }
ICSA-20-329-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Sharon Brizinov" ], "organization": "Claroty", "summary": "reporting these vulnerabilities to Rockwell Automation PSIRT" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow a denial-of-service condition, remote code execution, or leak information that could be used to bypass address space layout randomization (ASLR).", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Energy, Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "United States", "title": "Company headquarters location" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-20-329-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-329-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-20-329-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-329-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Rockwell Automation FactoryTalk Linx", "tracking": { "current_release_date": "2020-11-24T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-20-329-01", "initial_release_date": "2020-11-24T00:00:00.000000Z", "revision_history": [ { "date": "2020-11-24T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-20-329-01 Rockwell Automation FactoryTalk Linx" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 6.11", "product": { "name": "FactoryTalk Linx: Version 6.11 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "FactoryTalk Linx" } ], "category": "vendor", "name": "Rockwell Automation" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-27253", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A flaw exists in the Ingress/Egress checks routine of FactoryTalk Linx. This vulnerability could allow a remote, unauthenticated attacker to specifically craft a malicious packet resulting in a denial-of-service condition on the device.CVE-2020-27253 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27253" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Rockwell Automation recommends users of the affected FactoryTalk Linx update to an available software revision that addresses the associated risk.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "FactoryTalk Linx v6.10/6.11 (see Patch Answer ID 1126433). Additionally, the user could move to v6.20, which is available on PCDC (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126433/loc/en_US#__highlight" }, { "category": "mitigation", "details": "Run all software as \u201cuser\u201d (not as \u201cadministrator\u201d) to minimize the impact of malicious code on the infected system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use of Microsoft AppLocker or other similar whitelisting application can help mitigate risk. Information on using AppLocker with Rockwell Automation products is available at Knowledgebase Article ID 546989 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/546989" }, { "category": "mitigation", "details": "Confirm that the least-privilege user principle is followed, and user/service account access to shared resources (such as a database) is only granted with a minimum amount of rights as needed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use trusted software, software patches, antivirus/antimalware programs, and interact only with trusted websites and attachments.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and confirm that they are not accessible from the Internet. For further information about the risks of unprotected Internet-accessible control systems, please see Knowledgebase Article ID 494865 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/494865" }, { "category": "mitigation", "details": "Locate control system networks and devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information refer to Rockwell\u0027s Industrial Security Advisory ID 1128684 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1128684/loc/en_US#__highlight" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-27251", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A heap overflow vulnerability exists within FactoryTalk Linx. This vulnerability could allow a remote, unauthenticated attacker to send malicious port ranges, which could result in remote code execution.CVE-2020-27251 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27251" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Rockwell Automation recommends users of the affected FactoryTalk Linx update to an available software revision that addresses the associated risk.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "FactoryTalk Linx v6.10/6.11 (see Patch Answer ID 1126433). Additionally, the user could move to v6.20, which is available on PCDC (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126433/loc/en_US#__highlight" }, { "category": "mitigation", "details": "Run all software as \u201cuser\u201d (not as \u201cadministrator\u201d) to minimize the impact of malicious code on the infected system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use of Microsoft AppLocker or other similar whitelisting application can help mitigate risk. Information on using AppLocker with Rockwell Automation products is available at Knowledgebase Article ID 546989 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/546989" }, { "category": "mitigation", "details": "Confirm that the least-privilege user principle is followed, and user/service account access to shared resources (such as a database) is only granted with a minimum amount of rights as needed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use trusted software, software patches, antivirus/antimalware programs, and interact only with trusted websites and attachments.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and confirm that they are not accessible from the Internet. For further information about the risks of unprotected Internet-accessible control systems, please see Knowledgebase Article ID 494865 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/494865" }, { "category": "mitigation", "details": "Locate control system networks and devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information refer to Rockwell\u0027s Industrial Security Advisory ID 1128684 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1128684/loc/en_US#__highlight" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-27255", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A heap overflow vulnerability exists within FactoryTalk Linx. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR).CVE-2020-27255 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27255" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Rockwell Automation recommends users of the affected FactoryTalk Linx update to an available software revision that addresses the associated risk.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "FactoryTalk Linx v6.10/6.11 (see Patch Answer ID 1126433). Additionally, the user could move to v6.20, which is available on PCDC (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126433/loc/en_US#__highlight" }, { "category": "mitigation", "details": "Run all software as \u201cuser\u201d (not as \u201cadministrator\u201d) to minimize the impact of malicious code on the infected system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use of Microsoft AppLocker or other similar whitelisting application can help mitigate risk. Information on using AppLocker with Rockwell Automation products is available at Knowledgebase Article ID 546989 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/546989" }, { "category": "mitigation", "details": "Confirm that the least-privilege user principle is followed, and user/service account access to shared resources (such as a database) is only granted with a minimum amount of rights as needed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use trusted software, software patches, antivirus/antimalware programs, and interact only with trusted websites and attachments.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and confirm that they are not accessible from the Internet. For further information about the risks of unprotected Internet-accessible control systems, please see Knowledgebase Article ID 494865 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/494865" }, { "category": "mitigation", "details": "Locate control system networks and devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information refer to Rockwell\u0027s Industrial Security Advisory ID 1128684 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1128684/loc/en_US#__highlight" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
icsa-20-329-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Sharon Brizinov" ], "organization": "Claroty", "summary": "reporting these vulnerabilities to Rockwell Automation PSIRT" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow a denial-of-service condition, remote code execution, or leak information that could be used to bypass address space layout randomization (ASLR).", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Energy, Water and Wastewater Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "United States", "title": "Company headquarters location" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-20-329-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-329-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-20-329-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-329-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Rockwell Automation FactoryTalk Linx", "tracking": { "current_release_date": "2020-11-24T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-20-329-01", "initial_release_date": "2020-11-24T00:00:00.000000Z", "revision_history": [ { "date": "2020-11-24T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-20-329-01 Rockwell Automation FactoryTalk Linx" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 6.11", "product": { "name": "FactoryTalk Linx: Version 6.11 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "FactoryTalk Linx" } ], "category": "vendor", "name": "Rockwell Automation" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-27253", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A flaw exists in the Ingress/Egress checks routine of FactoryTalk Linx. This vulnerability could allow a remote, unauthenticated attacker to specifically craft a malicious packet resulting in a denial-of-service condition on the device.CVE-2020-27253 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27253" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Rockwell Automation recommends users of the affected FactoryTalk Linx update to an available software revision that addresses the associated risk.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "FactoryTalk Linx v6.10/6.11 (see Patch Answer ID 1126433). Additionally, the user could move to v6.20, which is available on PCDC (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126433/loc/en_US#__highlight" }, { "category": "mitigation", "details": "Run all software as \u201cuser\u201d (not as \u201cadministrator\u201d) to minimize the impact of malicious code on the infected system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use of Microsoft AppLocker or other similar whitelisting application can help mitigate risk. Information on using AppLocker with Rockwell Automation products is available at Knowledgebase Article ID 546989 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/546989" }, { "category": "mitigation", "details": "Confirm that the least-privilege user principle is followed, and user/service account access to shared resources (such as a database) is only granted with a minimum amount of rights as needed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use trusted software, software patches, antivirus/antimalware programs, and interact only with trusted websites and attachments.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and confirm that they are not accessible from the Internet. For further information about the risks of unprotected Internet-accessible control systems, please see Knowledgebase Article ID 494865 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/494865" }, { "category": "mitigation", "details": "Locate control system networks and devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information refer to Rockwell\u0027s Industrial Security Advisory ID 1128684 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1128684/loc/en_US#__highlight" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-27251", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A heap overflow vulnerability exists within FactoryTalk Linx. This vulnerability could allow a remote, unauthenticated attacker to send malicious port ranges, which could result in remote code execution.CVE-2020-27251 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27251" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Rockwell Automation recommends users of the affected FactoryTalk Linx update to an available software revision that addresses the associated risk.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "FactoryTalk Linx v6.10/6.11 (see Patch Answer ID 1126433). Additionally, the user could move to v6.20, which is available on PCDC (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126433/loc/en_US#__highlight" }, { "category": "mitigation", "details": "Run all software as \u201cuser\u201d (not as \u201cadministrator\u201d) to minimize the impact of malicious code on the infected system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use of Microsoft AppLocker or other similar whitelisting application can help mitigate risk. Information on using AppLocker with Rockwell Automation products is available at Knowledgebase Article ID 546989 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/546989" }, { "category": "mitigation", "details": "Confirm that the least-privilege user principle is followed, and user/service account access to shared resources (such as a database) is only granted with a minimum amount of rights as needed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use trusted software, software patches, antivirus/antimalware programs, and interact only with trusted websites and attachments.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and confirm that they are not accessible from the Internet. For further information about the risks of unprotected Internet-accessible control systems, please see Knowledgebase Article ID 494865 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/494865" }, { "category": "mitigation", "details": "Locate control system networks and devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information refer to Rockwell\u0027s Industrial Security Advisory ID 1128684 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1128684/loc/en_US#__highlight" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-27255", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A heap overflow vulnerability exists within FactoryTalk Linx. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR).CVE-2020-27255 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27255" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Rockwell Automation recommends users of the affected FactoryTalk Linx update to an available software revision that addresses the associated risk.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "FactoryTalk Linx v6.10/6.11 (see Patch Answer ID 1126433). Additionally, the user could move to v6.20, which is available on PCDC (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1126433/loc/en_US#__highlight" }, { "category": "mitigation", "details": "Run all software as \u201cuser\u201d (not as \u201cadministrator\u201d) to minimize the impact of malicious code on the infected system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use of Microsoft AppLocker or other similar whitelisting application can help mitigate risk. Information on using AppLocker with Rockwell Automation products is available at Knowledgebase Article ID 546989 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/546989" }, { "category": "mitigation", "details": "Confirm that the least-privilege user principle is followed, and user/service account access to shared resources (such as a database) is only granted with a minimum amount of rights as needed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Use trusted software, software patches, antivirus/antimalware programs, and interact only with trusted websites and attachments.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Minimize network exposure for all control system devices and/or systems and confirm that they are not accessible from the Internet. For further information about the risks of unprotected Internet-accessible control systems, please see Knowledgebase Article ID 494865 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/494865" }, { "category": "mitigation", "details": "Locate control system networks and devices behind firewalls and isolate them from the business network.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For more information refer to Rockwell\u0027s Industrial Security Advisory ID 1128684 (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1128684/loc/en_US#__highlight" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
fkie_cve-2020-27255
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
rockwellautomation | factorytalk_linx | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_linx:*:*:*:*:*:*:*:*", "matchCriteriaId": "89622117-4485-4204-A5DA-B72F7F13D353", "versionEndIncluding": "6.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR)." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de desbordamiento de la pila en FactoryTalk Linx versiones 6.11 y anteriores.\u0026#xa0;Esta vulnerabilidad podr\u00eda permitir a un atacante remoto no autenticado enviar peticiones de atributos de configuraci\u00f3n maliciosos, lo que podr\u00eda resultar en un filtrado de informaci\u00f3n confidencial.\u0026#xa0;Esta divulgaci\u00f3n de informaci\u00f3n podr\u00eda conllevar a una omisi\u00f3n de la aleatorizaci\u00f3n del dise\u00f1o de espacio de direcciones (ASLR)" } ], "id": "CVE-2020-27255", "lastModified": "2024-11-21T05:20:57.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-26T02:15:12.243", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "ics-cert@hq.dhs.gov", "type": "Primary" } ] }
var-202011-0742
Vulnerability from variot
A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR). Rockwell Automation Provided by the company FactoryTalk Linx Is vulnerable to several vulnerabilities: ‥ * Improper input confirmation (CWE-20) - CVE-2020-27253 ‥ * Heap-based buffer overflow (CWE-122) - CVE-2020-27251 ‥ * Heap-based buffer overflow (CWE-122) - CVE-2020-27255The expected impact depends on each vulnerability, but it may be affected as follows. * FactoryTalk Linx There is a defect in the input / output check routine of the service, and a malicious packet is sent by a remote third party, which interferes with service operation. (DoS) Be in a state - CVE-2020-27253 * A remote third party sends a request with a malicious value for a parameter that specifies a port range and executes arbitrary code. FactoryTalk Linx is a FactoryTalk Live Data server and communication service designed to transfer control system information from Allen-Bradley control products to Rockwell Automation FactoryTalk software product portfolio and Studio5000 design software. Rockwell Automation FactoryTalk Linx is a set of industrial communication solutions from Rockwell Automation, USA. This product is mainly used for communication between small applications and large automation systems
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-0742", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "factorytalk linx", "scope": "lte", "trust": 1.0, "vendor": "rockwellautomation", "version": "6.11" }, { "model": "factorytalk linx", "scope": "eq", "trust": 0.8, "vendor": "rockwell automation", "version": "version 6.11" }, { "model": "automation factorytalk linx", "scope": "lte", "trust": 0.6, "vendor": "rockwell", "version": "\u003c=6.11" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-71207" }, { "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "db": "NVD", "id": "CVE-2020-27255" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:rockwellautomation:factorytalk_linx", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009655" } ] }, "cve": "CVE-2020-27255", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-27255", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-71207", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-370733", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-27255", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA score", "availabilityImpact": "High", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-009655", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "JPCERT/CC score", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-009655", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "JPCERT/CC score", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2020-009655", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-27255", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2020-009655", "trust": 0.8, "value": "High" }, { "author": "JPCERT/CC", "id": "JVNDB-2020-009655", "trust": 0.8, "value": "Critical" }, { "author": "JPCERT/CC", "id": "JVNDB-2020-009655", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-71207", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202011-1838", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-370733", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-27255", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-71207" }, { "db": "VULHUB", "id": "VHN-370733" }, { "db": "VULMON", "id": "CVE-2020-27255" }, { "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "db": "CNNVD", "id": "CNNVD-202011-1838" }, { "db": "NVD", "id": "CVE-2020-27255" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR). Rockwell Automation Provided by the company FactoryTalk Linx Is vulnerable to several vulnerabilities: \u2025 * Improper input confirmation (CWE-20) - CVE-2020-27253 \u2025 * Heap-based buffer overflow (CWE-122) - CVE-2020-27251 \u2025 * Heap-based buffer overflow (CWE-122) - CVE-2020-27255The expected impact depends on each vulnerability, but it may be affected as follows. * FactoryTalk Linx There is a defect in the input / output check routine of the service, and a malicious packet is sent by a remote third party, which interferes with service operation. (DoS) Be in a state - CVE-2020-27253 * A remote third party sends a request with a malicious value for a parameter that specifies a port range and executes arbitrary code. FactoryTalk Linx is a FactoryTalk Live Data server and communication service designed to transfer control system information from Allen-Bradley control products to Rockwell Automation FactoryTalk software product portfolio and Studio5000 design software. Rockwell Automation FactoryTalk Linx is a set of industrial communication solutions from Rockwell Automation, USA. This product is mainly used for communication between small applications and large automation systems", "sources": [ { "db": "NVD", "id": "CVE-2020-27255" }, { "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "db": "CNVD", "id": "CNVD-2020-71207" }, { "db": "VULHUB", "id": "VHN-370733" }, { "db": "VULMON", "id": "CVE-2020-27255" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-27255", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-329-01", "trust": 3.2 }, { "db": "JVN", "id": "JVNVU98689901", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-009655", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202011-1838", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-71207", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4170", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-370733", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-27255", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-71207" }, { "db": "VULHUB", "id": "VHN-370733" }, { "db": "VULMON", "id": "CVE-2020-27255" }, { "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "db": "CNNVD", "id": "CNNVD-202011-1838" }, { "db": "NVD", "id": "CVE-2020-27255" } ] }, "id": "VAR-202011-0742", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-71207" }, { "db": "VULHUB", "id": "VHN-370733" } ], "trust": 1.3064814999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-71207" } ] }, "last_update_date": "2024-11-23T22:11:15.622000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch Answer ID 1126433 (\u8981\u30ed\u30b0\u30a4\u30f3)", "trust": 0.8, "url": "https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1126433#__highlight" }, { "title": "\u30ca\u30ec\u30c3\u30b8\u30d9\u30fc\u30b9 ID 546989 (\u8981\u30ed\u30b0\u30a4\u30f3)", "trust": 0.8, "url": "https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F546989" }, { "title": "\u30ca\u30ec\u30c3\u30b8\u30d9\u30fc\u30b9 ID 494865 (\u8981\u30ed\u30b0\u30a4\u30f3)", "trust": 0.8, "url": "https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F494865" }, { "title": "Patch for FactoryTalk Linx heap buffer overflow vulnerability (CNVD-2020-71207)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/242074" }, { "title": "Rockwell Automation FactoryTalk Linx Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=135541" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-71207" }, { "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "db": "CNNVD", "id": "CNNVD-202011-1838" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-122", "trust": 1.9 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-370733" }, { "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "db": "NVD", "id": "CVE-2020-27255" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27251" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27253" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27255" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98689901" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4170/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27255" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-71207" }, { "db": "VULHUB", "id": "VHN-370733" }, { "db": "VULMON", "id": "CVE-2020-27255" }, { "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "db": "CNNVD", "id": "CNNVD-202011-1838" }, { "db": "NVD", "id": "CVE-2020-27255" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-71207" }, { "db": "VULHUB", "id": "VHN-370733" }, { "db": "VULMON", "id": "CVE-2020-27255" }, { "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "db": "CNNVD", "id": "CNNVD-202011-1838" }, { "db": "NVD", "id": "CVE-2020-27255" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-24T00:00:00", "db": "CNVD", "id": "CNVD-2020-71207" }, { "date": "2020-11-26T00:00:00", "db": "VULHUB", "id": "VHN-370733" }, { "date": "2020-11-26T00:00:00", "db": "VULMON", "id": "CVE-2020-27255" }, { "date": "2020-11-26T06:22:08", "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "date": "2020-11-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-1838" }, { "date": "2020-11-26T02:15:12.243000", "db": "NVD", "id": "CVE-2020-27255" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2020-71207" }, { "date": "2020-11-30T00:00:00", "db": "VULHUB", "id": "VHN-370733" }, { "date": "2020-11-30T00:00:00", "db": "VULMON", "id": "CVE-2020-27255" }, { "date": "2020-11-26T06:22:08", "db": "JVNDB", "id": "JVNDB-2020-009655" }, { "date": "2020-12-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-1838" }, { "date": "2024-11-21T05:20:57.113000", "db": "NVD", "id": "CVE-2020-27255" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-1838" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rockwell Automation Made FactoryTalk Linx Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009655" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-1838" } ], "trust": 0.6 } }
ghsa-q4jm-4p9g-2h6g
Vulnerability from github
A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR).
{ "affected": [], "aliases": [ "CVE-2020-27255" ], "database_specific": { "cwe_ids": [ "CWE-122" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-11-26T02:15:00Z", "severity": "HIGH" }, "details": "A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR).", "id": "GHSA-q4jm-4p9g-2h6g", "modified": "2022-05-24T17:34:58Z", "published": "2022-05-24T17:34:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27255" }, { "type": "WEB", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.