Rockwell Automation RSLinx Classic < 4.00.01 Local Privilege Escalation

Medium Nessus Plugin ID 110534


An application running on the remote host is affected by a local
privilege escalation vulnerability.


The remote host has a version of RSLinx Classic installed that is
prior to 4.00.01. It is, therefore, affected by a local privilege
escalation vulnerability due to an unquoted path for a Windows service.
A local attacker can gain elevated privileges by inserting an
executable file in the path of the affected service.


Upgrade to Rockwell Automation RSLinx Classic version 4.00.01 or

See Also

Plugin Details

Severity: Medium

ID: 110534

File Name: scada_rslinx_classic_4_00_01.nbin

Version: 1.11

Type: local

Family: SCADA

Published: 2018/06/14

Modified: 2019/02/15

Dependencies: 83522

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2018-10619

CVSS v2.0

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:rockwellautomation:rslinx_classic

Patch Publication Date: 2018/06/07

Vulnerability Publication Date: 2018/06/07

Reference Information

CVE: CVE-2018-10619

BID: 104415

ICSA: 18-158-01