Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.

Project Subscriptions

Vendors Products
Rockwellautomation Subscribe
Aadvance Controller Subscribe
Isagraf Free Runtime Subscribe
Isagraf Runtime Subscribe
Micro810 Subscribe
Micro810 Firmware Subscribe
Micro820 Subscribe
Micro820 Firmware Subscribe
Micro830 Subscribe
Micro830 Firmware Subscribe
Micro850 Subscribe
Micro850 Firmware Subscribe
Micro870 Subscribe
Micro870 Firmware Subscribe
Schneider-electric Subscribe
Easergy C5 Subscribe
Easergy C5 Firmware Subscribe
Easergy T300 Subscribe
Easergy T300 Firmware Subscribe
Epas Gtw Subscribe
Epas Gtw Firmware Subscribe
Micom C264 Subscribe
Micom C264 Firmware Subscribe
Pacis Gtw Subscribe
Pacis Gtw Firmware Subscribe
Saitel Dp Subscribe
Saitel Dp Firmware Subscribe
Saitel Dr Subscribe
Saitel Dr Firmware Subscribe
Scd2200 Firmware Subscribe
Multismart Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-17873 Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.
Fixes

Solution

Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime's folder location is granted with a minimum amount of rights needed. Rockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy. To reduce risk, Rockwell Automation recommends users: Employ proper network segmentation and security controls. Minimize network exposure for all control system devices. Locate control systems behind firewalls. Isolate control systems from other networks when possible. Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies. Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances. Ensure the least-privilege user principle is followed, and user/service account access to Runtime’s folder location is granted with a minimum amount of rights, as needed. Please see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products.


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T17:59:44.664Z

Reserved: 2020-09-04T00:00:00.000Z

Link: CVE-2020-25182

cve-icon Vulnrichment

Updated: 2024-08-04T15:26:09.509Z

cve-icon NVD

Status : Modified

Published: 2022-03-18T18:15:09.243

Modified: 2024-11-21T05:17:34.790

Link: CVE-2020-25182

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses