ID

VAR-202012-1431


CVE

CVE-2020-5802


TITLE

FactoryTalk Linx  Vulnerability in handling exceptional conditions in

Trust: 0.8

sources: JVNDB: JVNDB-2020-014970

DESCRIPTION

An attacker-controlled memory allocation size can be passed to the C++ new operator in RnaDaSvr.dll by sending a specially crafted ConfigureItems message to TCP port 4241. This will cause an unhandled exception, resulting in termination of RSLinxNG.exe. Observed in FactoryTalk 6.11. All versions of FactoryTalk Linx are affected. FactoryTalk Linx Is vulnerable to handling exceptional conditions.Denial of service (DoS) It may be put into a state. Rockwell Automation FactoryTalk Linx is a set of industrial communication solutions from Rockwell Automation, USA. This product is mainly used for communication between small applications and large automation systems

Trust: 1.71

sources: NVD: CVE-2020-5802 // JVNDB: JVNDB-2020-014970 // VULHUB: VHN-183927

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:factorytalk linxscope:lteversion:6.11

Trust: 1.0

vendor:rockwell automationmodel:factorytalk linxscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-014970 // NVD: CVE-2020-5802

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-5802
value: HIGH

Trust: 1.0

NVD: CVE-2020-5802
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202012-1771
value: HIGH

Trust: 0.6

VULHUB: VHN-183927
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-5802
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-183927
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-5802
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2020-5802
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-183927 // JVNDB: JVNDB-2020-014970 // CNNVD: CNNVD-202012-1771 // NVD: CVE-2020-5802

PROBLEMTYPE DATA

problemtype:CWE-770

Trust: 1.1

problemtype:Improper handling in exceptional conditions (CWE-755) [NVD Evaluation ]

Trust: 0.8

problemtype:CWE-755

Trust: 0.1

sources: VULHUB: VHN-183927 // JVNDB: JVNDB-2020-014970 // NVD: CVE-2020-5802

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202012-1771

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202012-1771

PATCH

title:Top Pageurl:https://www.rockwellautomation.com/

Trust: 0.8

title:Rockwell Automation FactoryTalk Linx Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138276

Trust: 0.6

sources: JVNDB: JVNDB-2020-014970 // CNNVD: CNNVD-202012-1771

EXTERNAL IDS

db:NVDid:CVE-2020-5802

Trust: 2.5

db:TENABLEid:TRA-2020-71

Trust: 2.5

db:JVNid:JVNVU98988953

Trust: 0.8

db:JVNDBid:JVNDB-2020-014970

Trust: 0.8

db:CNNVDid:CNNVD-202012-1771

Trust: 0.7

db:AUSCERTid:ESB-2021.0327

Trust: 0.6

db:ICS CERTid:ICSA-21-028-01

Trust: 0.6

db:VULHUBid:VHN-183927

Trust: 0.1

sources: VULHUB: VHN-183927 // JVNDB: JVNDB-2020-014970 // CNNVD: CNNVD-202012-1771 // NVD: CVE-2020-5802

REFERENCES

url:https://www.tenable.com/security/research/tra-2020-71

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-5802

Trust: 1.4

url:https://jvn.jp/vu/jvnvu98988953/

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-028-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0327/

Trust: 0.6

sources: VULHUB: VHN-183927 // JVNDB: JVNDB-2020-014970 // CNNVD: CNNVD-202012-1771 // NVD: CVE-2020-5802

SOURCES

db:VULHUBid:VHN-183927
db:JVNDBid:JVNDB-2020-014970
db:CNNVDid:CNNVD-202012-1771
db:NVDid:CVE-2020-5802

LAST UPDATE DATE

2024-11-23T21:35:01.265000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-183927date:2022-07-12T00:00:00
db:JVNDBid:JVNDB-2020-014970date:2021-09-06T08:38:00
db:CNNVDid:CNNVD-202012-1771date:2022-07-14T00:00:00
db:NVDid:CVE-2020-5802date:2024-11-21T05:34:37.430

SOURCES RELEASE DATE

db:VULHUBid:VHN-183927date:2020-12-29T00:00:00
db:JVNDBid:JVNDB-2020-014970date:2021-09-06T00:00:00
db:CNNVDid:CNNVD-202012-1771date:2020-12-29T00:00:00
db:NVDid:CVE-2020-5802date:2020-12-29T16:15:14.840