A local code execution security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.
https://www.cisa.gov/news-events/ics-advisories/icsa-25-317-06
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1760.html
Published: 2025-11-11
Updated: 2025-11-12
Base Score: 6.1
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:C
Severity: Medium
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
Base Score: 8.9
Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Severity: High
EPSS: 0.00016