CVE-2022-2463

Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. A crafted malicious .7z exchange file may allow an attacker to gain the privileges of the ISaGRAF Workbench software when opened. If the software is running at the SYSTEM level, then the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03 Mitigation Patch Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:rockwellautomation:isagraf_workbench:*:*:*:*:*:*:*:*

History

27 Aug 2022, 03:27

Type Values Removed Values Added
CPE cpe:2.3:a:rockwellautomation:isagraf_workbench:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03 - (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03 - Mitigation, Patch, Third Party Advisory, US Government Resource
First Time Rockwellautomation
Rockwellautomation isagraf Workbench

25 Aug 2022, 18:46

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-25 18:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-2463

Mitre link : CVE-2022-2463

CVE.ORG link : CVE-2022-2463


JSON object : View

Products Affected

rockwellautomation

  • isagraf_workbench
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')