In Rockwell Automation RSLinx Classic versions 4.11.00 and prior, an authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-04T11:06:10.564Z

Reserved: 2020-03-16T00:00:00

Link: CVE-2020-10642

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-13T19:15:11.000

Modified: 2024-11-21T04:55:45.520

Link: CVE-2020-10642

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.