First published: Mon Jun 15 2020(Updated: )
FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later, Studio 5000 Launcher: Version 31 and later Stud, 5000 Logix Designer software: Version 32 and prior is vulnerable. The parsing mechanism that processes certain file types does not provide input sanitation. This may allow an attacker to use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Factorytalk Linx | =6.00 | |
Rockwellautomation Factorytalk Linx | =6.10 | |
Rockwellautomation Factorytalk Linx | =6.11 | |
Rockwellautomation Rslinx Classic | <=4.11.00 | |
Rockwell Automation FactoryTalk Linx |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12001 is a vulnerability in Rockwell Automation FactoryTalk Linx that allows remote code execution via a directory traversal attack.
FactoryTalk Linx versions 6.00, 6.10, and 6.11 are affected.
RSLinx Classic v4.11.00 and prior, Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later are also affected.
CVE-2020-12001 has a severity rating of 9.8, which is considered critical.
To fix CVE-2020-12001, it is recommended to apply the necessary patches or updates provided by Rockwell Automation, and follow the mitigation steps outlined in the official advisories.
Yes, you can find more information about CVE-2020-12001 at the following references: [Customer Support](https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126945), [ZDI Advisory](https://www.zerodayinitiative.com/advisories/ZDI-20-733/), and [US-CERT Advisory](https://www.us-cert.gov/ics/advisories/icsa-20-163-02).