First published: Mon Jul 20 2020(Updated: )
In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the operating system, a local, authenticated attacker may corrupt the associated memory space allowing for arbitrary code execution. Rockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Factorytalk View | ||
Rockwell Automation CRITICAL INFRASTRUCTURE SECTORS: Chemical, Commercial Facilities, Critical Manufacturing, Energy, Government Facilities, Water and Wastewater Systems | ||
Rockwell Automation COUNTRIES/AREAS DEPLOYED: Worldwide | ||
Rockwell Automation COMPANY HEADQUARTERS LOCATION: United States |
Rockwell Automation has released new versions of the affected products to mitigate the reported vulnerabilities. Affected users who are not able to apply the latest update are encouraged to seek additional mitigations or workarounds from the vendor’s published guidelines in their security advisory. Rockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-12031.
CVE-2020-12031 has a severity rating of 7.8 (high).
CVE-2020-12031 allows a local, authenticated attacker to corrupt the memory space and execute arbitrary code in Rockwell Automation FactoryTalk View SE.
To mitigate CVE-2020-12031, Rockwell Automation recommends applying patch 1126290.
You can find more information about CVE-2020-12031 at the following references: - Rockwell Automation: https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944 - US-CERT: https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05