CVE-2022-1118
HIGH EXPLOITEDRockwellautomation Connected Componen... - Insecure Deserialization
Title source: ruleDescription
Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploited
Scores
CVSS v3
8.6
EPSS
0.4777
EPSS Percentile
97.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2023-05-02
Classification
CWE
CWE-502
Status
published
Affected Products (3)
rockwellautomation/connected_component_workbench
< 13.00.00
rockwellautomation/isagraf_workbench
< 6.6.9
rockwellautomation/safety_instrumented_systems_workstation
< 1.2
Timeline
Published
May 17, 2022
Tracked Since
Feb 18, 2026