Rockwell Automation ISaGRAF
Rockwell Automation's Connected Component Workbench, ISaGRAF Workbench, and Safety Instrumented Systems Workstation contain unsafe deserialization vulnerabilities (CWE-502) that allow arbitrary code execution when a user opens a malicious project file or configuration. The vulnerability is triggered during file parsing and executes code with the privileges of the user running the application. Connected Component Workbench versions 13.00.00 and earlier are affected. ISaGRAF Workbench versions 6.0 through 6.6.9 are affected. Safety Instrumented Systems Workstation v1.2 and prior (for Trusted Controllers) are affected. The attack requires local access to the workstation and user interaction to open the malicious file.
- Local access to the Windows workstation running the affected tool
- User must open a malicious file created by the attacker
- No special credentials or configuration required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/90f44e7a-62f7-4a21-8be5-26f888dc1017