Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.
Source: MITRE
Published: 2018-09-20
Updated: 2019-10-09
Type: CWE-119
Base Score: 7.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 10
Severity: HIGH
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 3.9
Severity: CRITICAL
OR
cpe:2.3:a:rockwellautomation:rslinx:*:*:*:*:classic:*:*:* versions up to 4.00.01 (inclusive)
ID | Name | Product | Family | Severity |
---|---|---|---|---|
500237 | Rockwellautomation Rslinx Improper Restriction of Operations within the Bounds of a Memory Buffer | Nessus | SCADA | high |
720266 | Rockwell Automation RSLinx Classic <= 4.00.01 Multiple Vulnerabilities (ICSA-18-263-02) | Nessus Network Monitor | SCADA | high |
119265 | Rockwell Automation RSLinx Classic ENGINE.dll Stack Buffer Overflow | Nessus | SCADA | high |
117671 | Rockwell Automation RSLinx Classic <= 4.00.01 Multiple Vulnerabilities | Nessus | SCADA | high |
720184 | Rockwell Automation RSLinx Classic <= 4.00.01 Malformed CIP Packet Triggered Buffer Overflow (deprecated) | Nessus Network Monitor | SCADA | high |