Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
The vulnerability exists because Connected Components Workbench does not limit the objects that can be deserialized. The vulnerability can be exploited by crafting a malicious serialized object and having it opened by a local user in Connected Components Workbench. It will result in remote code execution. This vulnerability, however, requires user interaction to be successfully exploited.
The vulnerability exists because the parsing mechanism that processes certain file types does not provide input sanitization for file paths. The vulnerability can be exploited by crafting a malicious file and having opened by Connected Components Workbench. It will result in overwriting existing files and create additional files with the same permissions as the Connected Components Workbench software. This vulnerability, however, requires user interaction to be successfully exploited.
The vulnerability exists because Connected Components Workbench does not sanitize paths specified within the .ccwarc archive file during extraction. The vulnerability can be exploited by creating a malicious .ccwarc archive file and having opened by Connected Components Workbench. It will result in the attacker gaining privileges of the software. This vulnerability, however, requires user interaction to be successfully exploited.
Rockwell Automation
Connected Components Workbench v12.00.00 and prior
Refer to vendor advisory for the complete list of affected products and their respective patches. https://us-cert.cisa.gov/ics/advisories/icsa-21-133-01