Remote Code Execution via Directory Traversal in Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) Protocol

Remote Code Execution via Directory Traversal in Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) Protocol

CVE-2020-25176 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

Learn more about our Cis Benchmark Audit For Microsoft Exchange Server.