Advisory Details

February 20th, 2020

(0Day) Rockwell Automation FactoryTalk RNADiagnosticsSrv Deserialization Of Untrusted Data Remote Code Execution Vulnerability

ZDI-20-261
ZDI-CAN-9309

CVE ID CVE-2020-6967
CVSS SCORE 9.8, (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
AFFECTED VENDORS Rockwell Automation
AFFECTED PRODUCTS FactoryTalk Diagnostics
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation ThinManager. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the RNADiagnosticsSrv endpoint, which listens on TCP port 8082 by default. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code under the context of SYSTEM.

ADDITIONAL DETAILS

This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.

10/01/19 - ZDI reported a vulnerability to ICS-CERT
10/01/19 - ICS-CERT provided ZDI with an ICS-VU #
01/24/20 - ZDI contacted ICS-CERT requesting a status update
01/27/20 - ICS-CERT shared the vendor's preference to release the fix along with other cases reported in January 2020
01/27/20 - ZDI reminded these were different cases with different due dates and offered an extension for this particular case
02/11/20 - ZDI notified ICS-CERT the intention to publish the case as 0-day on 02/20/20

-- Mitigation:
Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the service to trusted machines. Only the clients and servers that have a legitimate procedural relationship with the service should be permitted to communicate with it. This could be accomplished in a number of ways, most notably with firewall rules/whitelisting.


DISCLOSURE TIMELINE
  • 2019-10-01 - Vulnerability reported to vendor
  • 2020-02-20 - Coordinated public release of advisory
CREDIT rgod of 9sg
BACK TO ADVISORIES