CVE-2021-22281

Zip Slip Vulnerability in B&R Automation Studio Project Import

Description

: Relative Path Traversal vulnerability in B&R Industrial Automation Automation Studio allows Relative Path Traversal.This issue affects Automation Studio: from 4.0 through 4.12.

Remediation

Workaround:

  • B&R recommends the following specific workarounds and mitigations: Open only B&R Automation Studio project files from trusted source. Use encrypted export of B&R Automation Studio project files, thus only allowing access to legitimate users. Protect locations where B&R Automation Studio projects are stored from unauthorized access. This includes PLCs, when using the feature to back up project source files on target. Do not run B&R Automation Studio in elevated mode. Make sure, that Windows User Access Control (UAC) is enabled. Verify integrity of B&R Automation Studio project files, which are exchanged via potentially insecure channels In general, B&R recommends implementing the Cyber Security guidelines

Categories

6.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.12%
Vendor Advisory br-automation.com
Affected: B&R Industrial Automation Automation Studio
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-22281?
CVE-2021-22281 has been scored as a medium severity vulnerability.
How to fix CVE-2021-22281?
As a workaround for remediating CVE-2021-22281: B&R recommends the following specific workarounds and mitigations: Open only B&R Automation Studio project files from trusted source. Use encrypted export of B&R Automation Studio project files, thus only allowing access to legitimate users. Protect locations where B&R Automation Studio projects are stored from unauthorized access. This includes PLCs, when using the feature to back up project source files on target. Do not run B&R Automation Studio in elevated mode. Make sure, that Windows User Access Control (UAC) is enabled. Verify integrity of B&R Automation Studio project files, which are exchanged via potentially insecure channels In general, B&R recommends implementing the Cyber Security guidelines
Is CVE-2021-22281 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2021-22281 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-22281?
CVE-2021-22281 affects B&R Industrial Automation Automation Studio.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.