First published: Wed Mar 23 2022(Updated: )
Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation Connected Components Workbench | <=12.00.00 | |
Rockwell Automation Connected Components Workbench |
Rockwell Automation recommends users of the affected software update to an available software revision (Connected Components Workbench v13.00.00 or later) that addresses the associated risk.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-27475 is considered to be high due to the potential for remote code execution.
To fix CVE-2021-27475, it is recommended to update Connected Components Workbench to a version above 12.00.00.
CVE-2021-27475 can be exploited to execute arbitrary code by deserializing a malicious object.
CVE-2021-27475 affects users of Rockwell Automation Connected Components Workbench version 12.00.00 and prior.
Currently, there are no documented workarounds for CVE-2021-27475; updating the software is the best mitigation strategy.