Vulnerability Description
When opening a malicious solution file provided by an attacker, the application suffers from an XML external entity vulnerability due to an unsafe call within a dynamic link library file. An attacker could exploit this to pass data from local files to a remote web server, leading to a loss of confidentiality.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rockwellautomation | Connected Components Workbench | <= 12.0 |
| Rockwellautomation | Isagraf | <= 6.6.9 |
| Rockwellautomation | Safety Instrumented Systems Workstation | <= 1.1 |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-01MitigationPatchThird Party Advisory
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-01MitigationPatchThird Party Advisory
FAQ
What is CVE-2022-1018?
CVE-2022-1018 is a vulnerability with a CVSS score of 5.5 (MEDIUM). When opening a malicious solution file provided by an attacker, the application suffers from an XML external entity vulnerability due to an unsafe call within a dynamic link library file. An attacker ...
How severe is CVE-2022-1018?
CVE-2022-1018 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1018?
Check the references section above for vendor advisories and patch information. Affected products include: Rockwellautomation Connected Components Workbench, Rockwellautomation Isagraf, Rockwellautomation Safety Instrumented Systems Workstation.