Learn about CVE-2020-10642, an incorrect permission assignment vulnerability in Rockwell Automation RSLinx Classic versions 4.1.00 and prior, allowing attackers to execute malicious code with system privileges.
Rockwell Automation RSLinx Classic versions 4.1.00 and prior are affected by a vulnerability that could allow an authenticated local attacker to execute malicious code using system privileges.
Understanding CVE-2020-10642
In Rockwell Automation RSLinx Classic versions 4.11.00 and earlier, a specific manipulation by an authenticated local attacker could result in the execution of malicious code with system privileges when launching RSLinx Classic.
What is CVE-2020-10642?
This CVE refers to an incorrect permission assignment vulnerability (CWE-732) in Rockwell Automation RSLinx Classic versions 4.1.00 and prior. The flaw could be exploited by an authenticated local attacker to modify a registry key, potentially leading to the execution of malicious code with elevated privileges.
The Impact of CVE-2020-10642
The vulnerability could allow an attacker to execute arbitrary code with system privileges, posing a significant security risk to affected systems. Successful exploitation could result in unauthorized access, data theft, or system compromise.
Technical Details of CVE-2020-10642
Rockwell Automation RSLinx Classic versions 4.1.00 and prior are susceptible to the following technical details:
Vulnerability Description
An authenticated local attacker could manipulate a registry key, enabling the execution of malicious code with system privileges upon opening RSLinx Classic.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by an authenticated local attacker through specific manipulation of a registry key, potentially leading to the execution of malicious code with elevated privileges.
Mitigation and Prevention
To address CVE-2020-10642, consider the following mitigation strategies:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that Rockwell Automation RSLinx Classic is updated to a secure version that addresses the vulnerability.