CVE-2020-25176
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
18/03/2022
Last modified:
04/04/2022
Description
Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:* | 2.7.1 (including) | |
| cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:easergy_c5_firmware:*:*:*:*:*:*:*:* | 1.1.0 (excluding) | |
| cpe:2.3:h:schneider-electric:easergy_c5:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:micom_c264_firmware:*:*:*:*:*:*:*:* | d6.1 (excluding) | |
| cpe:2.3:h:schneider-electric:micom_c264:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.1:*:*:*:*:windows:*:* | ||
| cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.2:*:*:*:*:windows:*:* | ||
| cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.1:*:*:*:*:windows:*:* | ||
| cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:linux:*:* | ||
| cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:windows:*:* | ||
| cpe:2.3:h:schneider-electric:pacis_gtw:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:saitel_dp_firmware:*:*:*:*:*:*:*:* | 11.06.21 (including) | |
| cpe:2.3:h:schneider-electric:saitel_dp:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:linux:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04
- https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699
- https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf



