CVE-2020-25176

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an applications directory, which could lead to remote code execution.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.1 CRITICAL
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
icscertCNA
9.1 CRITICAL
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
VendorProductVersion
schneider-electriceasergy_t300_firmware
𝑥
≤ 2.7.1
schneider-electriceasergy_c5_firmware
𝑥
< 1.1.0
schneider-electricpacis_gtw_firmware
5.1
schneider-electricpacis_gtw_firmware
5.2
schneider-electricpacis_gtw_firmware
6.1
schneider-electricpacis_gtw_firmware
6.3
schneider-electricpacis_gtw_firmware
6.3
schneider-electricsaitel_dp_firmware
𝑥
≤ 11.06.21
schneider-electricepas_gtw_firmware
6.4
schneider-electricepas_gtw_firmware
6.4
schneider-electricsaitel_dr_firmware
𝑥
≤ 11.06.12
schneider-electricscd2200_firmware
𝑥
≤ 10024
rockwellautomationaadvance_controller
𝑥
≤ 1.40
rockwellautomationisagraf_free_runtime
𝑥
≤ 6.6.8
rockwellautomationisagraf_runtime
5.0 ≤
𝑥
< 6.0
rockwellautomationmicro810_firmware
-
rockwellautomationmicro820_firmware
-
rockwellautomationmicro830_firmware
-
rockwellautomationmicro850_firmware
-
rockwellautomationmicro870_firmware
-
xylemmultismart_firmware
𝑥
< 3.2.0
𝑥
= Vulnerable software versions