

Rewterz Threat Advisory – CVE-2021-31166 – HTTP Protocol Stack Remote Code Execution Vulnerability
May 17, 2021
Rewterz Threat Advisory – CVE-2021-20025 – SonicWall Email Security Virtual Appliance privilege escalation
May 17, 2021
Rewterz Threat Advisory – CVE-2021-31166 – HTTP Protocol Stack Remote Code Execution Vulnerability
May 17, 2021
Rewterz Threat Advisory – CVE-2021-20025 – SonicWall Email Security Virtual Appliance privilege escalation
May 17, 2021Severity
High
Analysis Summary
CVE-2021-27475
The vulnerability exists because Connected Components Workbench does not limit the objects that can be deserialized. The vulnerability can be exploited by crafting a malicious serialized object and having it opened by a local user in Connected Components Workbench. It will result in remote code execution. This vulnerability, however, requires user interaction to be successfully exploited.
CVE-2021-27471
The vulnerability exists because the parsing mechanism that processes certain file types does not provide input sanitization for file paths. The vulnerability can be exploited by crafting a malicious file and having opened by Connected Components Workbench. It will result in overwriting existing files and create additional files with the same permissions as the Connected Components Workbench software. This vulnerability, however, requires user interaction to be successfully exploited.
CVE-2021-27473
The vulnerability exists because Connected Components Workbench does not sanitize paths specified within the .ccwarc archive file during extraction. The vulnerability can be exploited by creating a malicious .ccwarc archive file and having opened by Connected Components Workbench. It will result in the attacker gaining privileges of the software. This vulnerability, however, requires user interaction to be successfully exploited.
Impact
- Remote Code Execution
- Data Overwrite
- Gaining Privilege
Affected Vendors
Rockwell Automation
Affected Products
Connected Components Workbench v12.00.00 and prior
Remediation
Refer to vendor advisory for the complete list of affected products and their respective patches. https://us-cert.cisa.gov/ics/advisories/icsa-21-133-01