CVE-2020-10642

In Rockwell Automation RSLinx Classic versions 4.11.00 and prior, an authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic.
References
Link Resource
https://www.us-cert.gov/ics/advisories/icsa-20-100-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:rockwellautomation:rslinx_classic:*:*:*:*:*:*:*:*

History

02 Apr 2021, 19:15

Type Values Removed Values Added
Summary In Rockwell Automation RSLinx Classic versions 4.1.00 and prior, an authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic. In Rockwell Automation RSLinx Classic versions 4.11.00 and prior, an authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic.

Information

Published : 2020-04-13 19:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-10642

Mitre link : CVE-2020-10642

CVE.ORG link : CVE-2020-10642


JSON object : View

Products Affected

rockwellautomation

  • rslinx_classic
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource