5.5
CVE-2022-1018
- EPSS 9.14%
- Published 01.04.2022 23:15:12
- Last modified 21.11.2024 06:39:52
- Source ics-cert@hq.dhs.gov
- Teams watchlist Login
- Open Login
When opening a malicious solution file provided by an attacker, the application suffers from an XML external entity vulnerability due to an unsafe call within a dynamic link library file. An attacker could exploit this to pass data from local files to a remote web server, leading to a loss of confidentiality.
Data is provided by the National Vulnerability Database (NVD)
Rockwellautomation ≫ Connected Components Workbench SwEdition- Version <= 12.0
Rockwellautomation ≫ Isagraf Version <= 6.6.9
Rockwellautomation ≫ Safety Instrumented Systems Workstation Version <= 1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 9.14% | 0.924 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:P/I:N/A:N
|
ics-cert@hq.dhs.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
|
CWE-611 Improper Restriction of XML External Entity Reference
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.