CVE-2020-10642
UNKNOWN
Published 2020-04-13T18:52:48
Actions:
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2020-10642. We'll provide specific mitigation strategies based on your environment and risk profile.
No CVSS data available
Description
In Rockwell Automation RSLinx Classic versions 4.11.00 and prior, an authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
⚠ Unreviewed
HIGH
GHSA-qgxw-xq35-5qcq
Advisory Details
In Rockwell Automation RSLinx Classic versions 4.1.00 and prior, an authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic.
CVSS Scoring
CVSS Score
7.5
References
Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: May 24, 2022
Published: 2020-04-13T18:52:48
Last Modified: 2024-08-04T11:06:10.564Z
Copied to clipboard!