![]() ![]() Locate control system networks and remote devices behind firewalls, and isolate them from the business network.Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.Affected users are encouraged to apply the most recent version of RSLinx Classic.ĬISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. MITIGATIONSįor Versions 3.60 to 4.11, Rockwell Automation recommends users apply patch 1091155. Rockwell Automation working with Applied Risk reported this vulnerability to CISA. COMPANY HEADQUARTERS LOCATION: United States.CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing, Energy, Water and Wastewater Systems.A CVSS v3 base score of 8.8 has been assigned the CVSS vector string is ( AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). The following versions of RSLinx Classic PLC communications software are affected:ģ.2 VULNERABILITY OVERVIEW 3.2.1 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732Īn authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic.ĬVE-2020-10642 has been assigned to this vulnerability. Successful exploitation of this vulnerability could allow a local authenticated attacker to execute malicious code when opening RSLinx Classic. Vulnerability: Incorrect Permission Assignment for Critical Resource.
0 Comments
Leave a Reply. |