Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-27475— Rockwell Automation Connected Components Workbench Deserialization of Untrusted Data

CVSS 8.6 · High EPSS 0.21% · P42
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-27475

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Rockwell Automation Connected Components Workbench Deserialization of Untrusted Data
Source: NVD (National Vulnerability Database)
Vulnerability Description
Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
可信数据的反序列化
Source: NVD (National Vulnerability Database)
Vulnerability Title
Rockwell Automation Connected Components Workbench 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Rockwell Automation Connected Components Workbench是美国罗克韦尔(Rockwell Automation )公司的一个应用软件。一个自动编程软件。 Rockwell Automation Connected Components Workbench 12.00.00版本及之前存在代码问题漏洞。该漏洞源于程序的组件工作台不限制可以反序列化的对象,攻击者可以利用该漏洞远程执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Rockwell AutomationConnected Components Workbench unspecified ~ v12.00.00 -

II. Public POCs for CVE-2021-27475

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-27475

登录查看更多情报信息。

Same Patch Batch · Rockwell Automation · 2022-03-23 · 12 CVEs total

CVE-2021-2746010.0 CRITICALRockwell Automation FactoryTalk AssetCentre Deserialization of Untrusted Data
CVE-2021-2746210.0 CRITICALRockwell Automation FactoryTalk AssetCentre Deserialization of Untrusted Data
CVE-2021-2746410.0 CRITICALRockwell Automation FactoryTalk AssetCentre SQL Injection
CVE-2021-2747210.0 CRITICALRockwell Automation FactoryTalk AssetCentre SQL Injection
CVE-2021-2746810.0 CRITICALRockwell Automation FactoryTalk AssetCentre SQL Injection
CVE-2021-2747410.0 CRITICALRockwell Automation FactoryTalk AssetCentre Use of Potentially Dangerous Function
CVE-2021-2746610.0 CRITICALRockwell Automation FactoryTalk AssetCentre Deserialization of Untrusted Data
CVE-2021-2747010.0 CRITICALRockwell Automation FactoryTalk AssetCentre Deserialization of Untrusted Data
CVE-2021-2747610.0 CRITICALRockwell Automation FactoryTalk AssetCentre OS Command Injection
CVE-2021-274717.7 HIGHRockwell Automation Connected Components Workbench Path Traversal
CVE-2021-274736.1 MEDIUMRockwell Automation Connected Components Workbench Improper Input Validation

IV. Related Vulnerabilities

V. Comments for CVE-2021-27475

No comments yet


Leave a comment