![]() Rockwell Automation working with Applied Risk reported this vulnerability to CISA. COMPANY HEADQUARTERS LOCATION: United States.CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing, Energy, Water and Wastewater Systems.A CVSS v3 base score of 8.8 has been assigned the CVSS vector string is ( AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). The following versions of RSLinx Classic PLC communications software are affected:ģ.2 VULNERABILITY OVERVIEW 3.2.1 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732Īn authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic.ĬVE-2020-10642 has been assigned to this vulnerability. ![]() Successful exploitation of this vulnerability could allow a local authenticated attacker to execute malicious code when opening RSLinx Classic. Vulnerability: Incorrect Permission Assignment for Critical Resource.
0 Comments
Leave a Reply. |