It may be suggested to replace the affected object with an alternative product.ĬVSSv3 info edit VulDB Meta Base Score: 7. There is no information about possible countermeasures known. The pricing for an exploit might be around USD $0-$5k at the moment ( estimation calculated on ). The technical details are unknown and an exploit is not publicly available. The requirement for exploitation is a single authentication. This vulnerability is known as CVE-2020-10642 since. In Rockwell Automation RSLinx Classic versions 4.1.00 and prior, an authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic. As an impact it is known to affect confidentiality, integrity, and availability. The CWE definition for the vulnerability is CWE-732. The manipulation with an unknown input leads to a privilege escalation vulnerability. Affected by this vulnerability is an unknown code block of the component Registry Key Handler. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability has been found in Rockwell Automation RSLinx Classic up to 4.1.00 ( Automation Software) and classified as critical. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |