CVE-2020-25176Relative Path Traversal in Isagraf Runtime

Severity
9.8CRITICALNVD
CNA9.1
EPSS
3.5%
top 12.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 18
Latest updateMar 19

Description

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages13 packages

🔴Vulnerability Details

2
GHSA
GHSA-fg53-m5qv-8qwq: Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 42022-03-19
CVEList
Rockwell Automation ISaGRAF5 Runtime Relative Path Traversal2022-03-18
CVE-2020-25176 — Relative Path Traversal | cvebase