CVE-2021-27473
Rockwell Automation Connected Components Workbench vulnerability analysis and mitigation

Overview

Connected Components Workbench v12.00.00 and prior contains an improper input validation vulnerability (CVE-2021-27473) that does not sanitize paths specified within the .ccwarc archive file during extraction, commonly known as a Zip Slip vulnerability. This vulnerability was discovered and reported by Mashav Sapir of Claroty to Rockwell Automation (CISA Advisory).

Technical details

The vulnerability stems from improper input validation where the software fails to sanitize paths specified within the .ccwarc archive file during extraction. The vulnerability has been assigned a CVSS v3 base score of 6.1 with the vector string (AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating local access required with low attack complexity (CISA Advisory).

Impact

If successfully exploited, this vulnerability allows a local, authenticated attacker to gain the privileges of the software through a malicious .ccwarc archive file. If the software is running at SYSTEM level, the attacker can gain admin level privileges. The vulnerability requires user interaction to be successfully exploited (CISA Advisory).

Mitigation and workarounds

Rockwell Automation recommends updating to Connected Components Workbench v13.00.00 or later. If upgrading is not possible, users should: run the software as a User rather than Administrator, avoid opening untrusted .ccwarc files, implement training programs for phishing awareness, use Microsoft AppLocker or similar allowlist applications, and follow the least-privilege principle for user accounts (CISA Advisory).

Additional resources


SourceThis report was generated using AI

Related Rockwell Automation Connected Components Workbench vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2021-27475HIGH8.6
  • Rockwell Automation Connected Components WorkbenchRockwell Automation Connected Components Workbench
  • cpe:2.3:a:rockwellautomation:connected_components_workbench
NoNoMar 23, 2022
CVE-2021-27471HIGH8.6
  • Rockwell Automation Connected Components WorkbenchRockwell Automation Connected Components Workbench
  • cpe:2.3:a:rockwellautomation:connected_components_workbench
NoNoMar 23, 2022
CVE-2021-27473HIGH8.2
  • Rockwell Automation Connected Components WorkbenchRockwell Automation Connected Components Workbench
  • cpe:2.3:a:rockwellautomation:connected_components_workbench
NoNoMar 23, 2022
CVE-2014-5424HIGH7.5
  • Rockwell Automation Connected Components WorkbenchRockwell Automation Connected Components Workbench
  • cpe:2.3:a:rockwellautomation:connected_components_workbench
NoNoNov 14, 2014
CVE-2022-1018MEDIUM5.5
  • Rockwell Automation Connected Components WorkbenchRockwell Automation Connected Components Workbench
  • cpe:2.3:a:rockwellautomation:connected_components_workbench
NoNoApr 01, 2022

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management