Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-5807 : Vulnerability Insights and Analysis

Learn about CVE-2020-5807, a vulnerability allowing unauthenticated remote attackers to manipulate the FactoryTalk Diagnostics event log, potentially leading to a denial of service condition. Find mitigation steps and prevention measures here.

An unauthenticated remote attacker can send data to RsvcHost.exe listening on TCP port 5241 to add entries in the FactoryTalk Diagnostics event log. The attacker can specify long fields in the log entry, which can cause an unhandled exception in wcscpy_s() if a local user opens FactoryTalk Diagnostics Viewer (FTDiagViewer.exe) to view the log entry. Observed in FactoryTalk Diagnostics 6.11. All versions of FactoryTalk Diagnostics are affected.

Understanding CVE-2020-5807

This CVE describes a vulnerability in Rockwell FactoryTalk Diagnostics that allows an unauthenticated remote attacker to trigger a denial of service attack.

What is CVE-2020-5807?

The vulnerability allows remote attackers to manipulate the FactoryTalk Diagnostics event log, potentially leading to a denial of service condition.

The Impact of CVE-2020-5807

        An unauthenticated remote attacker can exploit the vulnerability to disrupt the service by causing an unhandled exception in the system.

Technical Details of CVE-2020-5807

The following technical details outline the specifics of the vulnerability.

Vulnerability Description

        Attackers can send data to RsvcHost.exe on TCP port 5241 to add entries in the FactoryTalk Diagnostics event log.
        Long fields in the log entry can trigger an unhandled exception in wcscpy_s() when viewed by a local user in FTDiagViewer.exe.

Affected Systems and Versions

        All versions of FactoryTalk Diagnostics are impacted by this vulnerability.

Exploitation Mechanism

        Remote attackers can exploit the vulnerability by sending crafted data to the specified port, leading to a denial of service condition.

Mitigation and Prevention

Protect your systems from CVE-2020-5807 with the following steps:

Immediate Steps to Take

        Implement firewall rules to restrict access to the vulnerable port.
        Monitor network traffic for any suspicious activity targeting port 5241.

Long-Term Security Practices

        Regularly update and patch the affected software to mitigate known vulnerabilities.
        Conduct security training for users to recognize and report suspicious activities.

Patching and Updates

        Apply patches and updates provided by the vendor to address the vulnerability and enhance system security.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now