First published: Thu Jun 07 2018(Updated: )
An unquoted search path or element in RSLinx Classic Versions 3.90.01 and prior and FactoryTalk Linx Gateway Versions 3.90.00 and prior may allow an authorized, but non-privileged local user to execute arbitrary code and allow a threat actor to escalate user privileges on the affected workstation.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Rslinx Classic | <3.90.01 | |
Rockwellautomation Factorytalk Linx Gateway | <3.90.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10619 refers to an unquoted search path or element vulnerability in RSLinx Classic Versions 3.90.01 and prior and FactoryTalk Linx Gateway Versions 3.90.00 and prior.
CVE-2018-10619 has a severity rating of 7.8, which is considered high.
CVE-2018-10619 can be exploited by an authorized, but non-privileged local user to execute arbitrary code and allow a threat actor to escalate user privileges on the affected workstation.
RSLinx Classic Versions 3.90.01 and prior and FactoryTalk Linx Gateway Versions 3.90.00 and prior are affected by CVE-2018-10619.
Yes, you can find references for CVE-2018-10619 at the following links: http://www.securityfocus.com/bid/104415, https://ics-cert.us-cert.gov/advisories/ICSA-18-158-01, https://www.exploit-db.com/exploits/44892/