9.3
CVSSv2

CVE-2020-25178

Published: 18/03/2022 Updated: 04/04/2022
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

ISaGRAF Workbench communicates with Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x using TCP/IP. This communication protocol provides various file system operations, as well as the uploading of applications. Data is transferred over this protocol unencrypted, which could allow a remote unauthenticated malicious user to upload, read, and delete files.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

schneider-electric easergy_t300_firmware

schneider-electric easergy_c5_firmware

schneider-electric micom_c264_firmware

schneider-electric pacis_gtw_firmware 5.1

schneider-electric pacis_gtw_firmware 5.2

schneider-electric pacis_gtw_firmware 6.1

schneider-electric pacis_gtw_firmware 6.3

schneider-electric saitel_dp_firmware

schneider-electric epas_gtw_firmware 6.4

schneider-electric saitel_dr_firmware

schneider-electric scd2200_firmware

rockwellautomation aadvance controller

rockwellautomation isagraf free runtime

rockwellautomation isagraf runtime

rockwellautomation micro810_firmware -

rockwellautomation micro820_firmware -

rockwellautomation micro830_firmware -

rockwellautomation micro850_firmware -

rockwellautomation micro870_firmware -

xylem multismart firmware