CVE-2020-25176

EUVD-2020-17867
Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.1 CRITICAL
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
icscertCNA
9.1 CRITICAL
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
Affected Products (NVD)
VendorProductVersion
schneider-electriceasergy_t300_firmware
𝑥
≤ 2.7.1
schneider-electriceasergy_c5_firmware
𝑥
< 1.1.0
schneider-electricpacis_gtw_firmware
5.1
schneider-electricpacis_gtw_firmware
5.2
schneider-electricpacis_gtw_firmware
6.1
schneider-electricpacis_gtw_firmware
6.3
schneider-electricpacis_gtw_firmware
6.3
schneider-electricsaitel_dp_firmware
𝑥
≤ 11.06.21
schneider-electricepas_gtw_firmware
6.4
schneider-electricepas_gtw_firmware
6.4
schneider-electricsaitel_dr_firmware
𝑥
≤ 11.06.12
schneider-electricscd2200_firmware
𝑥
≤ 10024
rockwellautomationaadvance_controller
𝑥
≤ 1.40
rockwellautomationisagraf_free_runtime
𝑥
≤ 6.6.8
rockwellautomationisagraf_runtime
5.0 ≤
𝑥
< 6.0
rockwellautomationmicro810_firmware
-
rockwellautomationmicro820_firmware
-
rockwellautomationmicro830_firmware
-
rockwellautomationmicro850_firmware
-
rockwellautomationmicro870_firmware
-
xylemmultismart_firmware
𝑥
< 3.2.0
𝑥
= Vulnerable software versions