CVE-2020-25176

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.1 CRITICAL
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
schneider-electriceasergy_t300_firmware
𝑥
≤ 2.7.1
schneider-electriceasergy_c5_firmware
𝑥
< 1.1.0
schneider-electricpacis_gtw_firmware
5.1
schneider-electricpacis_gtw_firmware
5.2
schneider-electricpacis_gtw_firmware
6.1
schneider-electricpacis_gtw_firmware
6.3
schneider-electricpacis_gtw_firmware
6.3
schneider-electricsaitel_dp_firmware
𝑥
≤ 11.06.21
schneider-electricepas_gtw_firmware
6.4
schneider-electricepas_gtw_firmware
6.4
schneider-electricsaitel_dr_firmware
𝑥
≤ 11.06.12
schneider-electricscd2200_firmware
𝑥
≤ 10024
rockwellautomationaadvance_controller
𝑥
≤ 1.40
rockwellautomationisagraf_free_runtime
𝑥
≤ 6.6.8
rockwellautomationisagraf_runtime
5.0 ≤
𝑥
< 6.0
rockwellautomationmicro810_firmware
-
rockwellautomationmicro820_firmware
-
rockwellautomationmicro830_firmware
-
rockwellautomationmicro850_firmware
-
rockwellautomationmicro870_firmware
-
xylemmultismart_firmware
𝑥
< 3.2.0
𝑥
= Vulnerable software versions