The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality.
Base Score: 5
Impact Score: 2.9
Exploitability Score: 10
Base Score: 7.5
Impact Score: 3.6
Exploitability Score: 3.9
cpe:2.3:a:rockwellautomation:rslinx:*:*:*:*:classic:*:*:* versions up to 4.00.01 (inclusive)
|500096||Rockwellautomation Rslinx Uncontrolled Resource Consumption||Tenable.ot||SCADA|
|720266||Rockwell Automation RSLinx Classic <= 4.00.01 Multiple Vulnerabilities (ICSA-18-263-02)||Nessus Network Monitor||SCADA|
|117671||Rockwell Automation RSLinx Classic <= 4.00.01 Multiple Vulnerabilities||Nessus||SCADA|
|720183||Rockwell Automation RSLinx Classic <= 4.00.01 Ethernet/IP Packet Triggered Crash (deprecated)||Nessus Network Monitor||SCADA|