CVE-2021-27471
low-risk
Published 2022-03-23
The parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by Rockwell Automation Connected Components Workbench v12.00.00 and prior, can traverse the file system. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the Connected Components Workbench software. User interaction is required for this exploit to be successful.
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.7/10
High
LOCAL
/ HIGH complexity
Affected Products (1)
Connected Components Workbench
Affected Vendors
References (4)
Permissions Required
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131435
Third Party Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-21-133-01
Permissions Required
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131435
Third Party Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-21-133-01
25
/ 100
low-risk
Severity
20/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal