Project Subscriptions
| Vendors | Products |
|---|---|
|
Rockwellautomation
Subscribe
|
Aadvance Controller
Subscribe
Isagraf Free Runtime
Subscribe
Isagraf Runtime
Subscribe
Micro810
Subscribe
Micro810 Firmware
Subscribe
Micro820
Subscribe
Micro820 Firmware
Subscribe
Micro830
Subscribe
Micro830 Firmware
Subscribe
Micro850
Subscribe
Micro850 Firmware
Subscribe
Micro870
Subscribe
Micro870 Firmware
Subscribe
|
|
Schneider-electric
Subscribe
|
Cp-3
Subscribe
Easergy C5
Subscribe
Easergy C5 Firmware
Subscribe
Easergy T300
Subscribe
Easergy T300 Firmware
Subscribe
Epas Gtw
Subscribe
Epas Gtw Firmware
Subscribe
Mc-31
Subscribe
Micom C264
Subscribe
Micom C264 Firmware
Subscribe
Pacis Gtw
Subscribe
Pacis Gtw Firmware
Subscribe
Saitel Dp
Subscribe
Saitel Dp Firmware
Subscribe
Saitel Dr
Subscribe
Saitel Dr Firmware
Subscribe
Scd2200 Firmware
Subscribe
|
|
Xylem
Subscribe
|
Multismart Firmware
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-17867 | Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution. |
Solution
Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime's folder location is granted with a minimum amount of rights needed. Rockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy. To reduce risk, Rockwell Automation recommends users: Employ proper network segmentation and security controls. Minimize network exposure for all control system devices. Locate control systems behind firewalls. Isolate control systems from other networks when possible. Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies. Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances. Ensure the least-privilege user principle is followed, and user/service account access to Runtime’s folder location is granted with a minimum amount of rights, as needed. Please see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products.
Workaround
No workaround given by the vendor.
Wed, 16 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:59:33.248Z
Reserved: 2020-09-04T00:00:00.000Z
Link: CVE-2020-25176
Updated: 2024-08-04T15:26:10.174Z
Status : Modified
Published: 2022-03-18T18:15:09.060
Modified: 2024-11-21T05:17:33.640
Link: CVE-2020-25176
No data.
OpenCVE Enrichment
No data.
EUVD