CVE-2022-2464

Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. Crafted malicious files can allow an attacker to traverse the file system when opened by ISaGRAF Workbench. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the ISaGRAF Workbench software. User interaction is required for this exploit to be successful.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03 Mitigation Patch Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:rockwellautomation:isagraf_workbench:*:*:*:*:*:*:*:*

History

27 Aug 2022, 03:29

Type Values Removed Values Added
CPE cpe:2.3:a:rockwellautomation:isagraf_workbench:*:*:*:*:*:*:*:*
References (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03 - (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03 - Mitigation, Patch, Third Party Advisory, US Government Resource
First Time Rockwellautomation
Rockwellautomation isagraf Workbench
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

25 Aug 2022, 18:46

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-25 18:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-2464

Mitre link : CVE-2022-2464

CVE.ORG link : CVE-2022-2464


JSON object : View

Products Affected

rockwellautomation

  • isagraf_workbench
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')