CVE-2022-1118

HIGH EXPLOITED

Rockwellautomation Connected Componen... - Insecure Deserialization

Title source: rule

Description

Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploited

Scores

CVSS v3 8.6
EPSS 0.4777
EPSS Percentile 97.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2023-05-02

Classification

CWE
CWE-502
Status published

Affected Products (3)

rockwellautomation/connected_component_workbench < 13.00.00
rockwellautomation/isagraf_workbench < 6.6.9
rockwellautomation/safety_instrumented_systems_workstation < 1.2

Timeline

Published May 17, 2022
Tracked Since Feb 18, 2026