Vulnerability Description
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. A crafted malicious .7z exchange file may allow an attacker to gain the privileges of the ISaGRAF Workbench software when opened. If the software is running at the SYSTEM level, then the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rockwellautomation | Isagraf Workbench | >= 6.0, <= 6.6.9 |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03MitigationPatchThird Party Advisory
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03MitigationPatchThird Party Advisory
FAQ
What is CVE-2022-2463?
CVE-2022-2463 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. A crafted malicious .7z exchange file may allow an attacker to gain the privil...
How severe is CVE-2022-2463?
CVE-2022-2463 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2463?
Check the references section above for vendor advisories and patch information. Affected products include: Rockwellautomation Isagraf Workbench.