First published: Mon Jul 20 2020(Updated: )
All versions of FactoryTalk View SE do not properly validate input of filenames within a project directory. A remote, unauthenticated attacker may be able to execute a crafted file on a remote endpoint that may result in remote code execution (RCE). Rockwell Automation recommends applying patch 1126289. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Factorytalk View | ||
Rockwell Automation CRITICAL INFRASTRUCTURE SECTORS: Chemical, Commercial Facilities, Critical Manufacturing, Energy, Government Facilities, Water and Wastewater Systems | ||
Rockwell Automation COUNTRIES/AREAS DEPLOYED: Worldwide | ||
Rockwell Automation COMPANY HEADQUARTERS LOCATION: United States |
Rockwell Automation has released new versions of the affected products to mitigate the reported vulnerabilities. Affected users who are not able to apply the latest update are encouraged to seek additional mitigations or workarounds from the vendor’s published guidelines in their security advisory. Rockwell Automation recommends applying patch 1126289. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12029 is a vulnerability in all versions of FactoryTalk View SE where input validation of filenames within a project directory is not properly performed, allowing a remote, unauthenticated attacker to execute a crafted file on a remote endpoint, potentially resulting in remote code execution (RCE).
CVE-2020-12029 has a severity rating of 7.8 out of 10 (Critical).
All versions of FactoryTalk View SE are affected by CVE-2020-12029.
It is recommended to apply patch 1126 to address the vulnerability CVE-2020-12029 in FactoryTalk View SE.
For more information about CVE-2020-12029, you can refer to the following resources: [Packet Storm Security](http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html), [Rockwell Automation](https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944), [US-CERT](https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05).