Vulnerability Details : CVE-2022-1118
Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploited
Products affected by CVE-2022-1118
- cpe:2.3:a:rockwellautomation:safety_instrumented_systems_workstation:*:*:*:*:*:*:*:*
- Rockwellautomation » Isagraf WorkbenchVersions from including (>=) 6.0 and up to, including, (<=) 6.6.9cpe:2.3:a:rockwellautomation:isagraf_workbench:*:*:*:*:*:*:*:*
- cpe:2.3:a:rockwellautomation:connected_component_workbench:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-1118
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 20 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-1118
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.6
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
1.8
|
6.0
|
ICS-CERT | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2022-1118
-
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.Assigned by: ics-cert@hq.dhs.gov (Primary)
References for CVE-2022-1118
-
https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01
Rockwell Automation ISaGRAF | CISAThird Party Advisory;US Government Resource
Jump to