← Back to CVEs
CVE-2020-12028
HIGH7.3
Description
In all versions of FactoryTalk View SEA remote, an authenticated attacker may be able to utilize certain handlers to interact with the data on the remote endpoint since those handlers do not enforce appropriate permissions. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs.
CVE Details
CVSS v3.1 Score7.3
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionREQUIRED
Published7/20/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
rockwellautomation:factorytalk_view
Weaknesses (CWE)
CWE-264CWE-306
References
http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html(ics-cert@hq.dhs.gov)
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944(ics-cert@hq.dhs.gov)
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05(ics-cert@hq.dhs.gov)
http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944(af854a3a-2127-422b-91ae-364da2661108)
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.