First published: Wed Mar 23 2022(Updated: )
The parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by Rockwell Automation Connected Components Workbench v12.00.00 and prior, can traverse the file system. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the Connected Components Workbench software. User interaction is required for this exploit to be successful.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Connected Components Workbench | <=12.00.00 | |
Rockwell Automation Connected Components Workbench v12.00.00 and prior |
Rockwell Automation recommends users of the affected software update to an available software revision (Connected Components Workbench v13.00.00 or later) that addresses the associated risk.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27471 has been assigned a high severity rating due to its potential for allowing file path traversal attacks.
To fix CVE-2021-27471, upgrade to a version of Rockwell Automation Connected Components Workbench that is newer than v12.00.00.
CVE-2021-27471 allows an attacker to traverse the file system by exploiting input sanitization weaknesses in the affected software.
CVE-2021-27471 affects Rockwell Automation Connected Components Workbench versions v12.00.00 and earlier.
Yes, CVE-2021-27471 can potentially be exploited remotely if a malicious file is opened within the affected software.