In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the operating system, a local, authenticated attacker may corrupt the associated memory space allowing for arbitrary code execution. Rockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.
References
Link | Resource |
---|---|
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944 | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05 | Third Party Advisory US Government Resource |
Configurations
Information
Published : 2020-07-20 09:15
Updated : 2021-09-23 06:34
NVD link : CVE-2020-12031
Mitre link : CVE-2020-12031
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
rockwellautomation
- factorytalk_view