CVE-2018-14829

HIGH

Description

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.

References

https://ics-cert.us-cert.gov/advisories/ICSA-18-263-02

https://www.tenable.com/security/research/tra-2018-26

Details

Source: MITRE

Published: 2018-09-20

Updated: 2019-10-09

Type: CWE-119

Risk Information

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:rockwellautomation:rslinx:*:*:*:*:classic:*:*:* versions up to 4.00.01 (inclusive)

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
500237Rockwellautomation Rslinx Improper Restriction of Operations within the Bounds of a Memory BufferNessusSCADA
high
720266Rockwell Automation RSLinx Classic <= 4.00.01 Multiple Vulnerabilities (ICSA-18-263-02)Nessus Network MonitorSCADA
high
119265Rockwell Automation RSLinx Classic ENGINE.dll Stack Buffer OverflowNessusSCADA
high
117671Rockwell Automation RSLinx Classic <= 4.00.01 Multiple VulnerabilitiesNessusSCADA
high
720184Rockwell Automation RSLinx Classic <= 4.00.01 Malformed CIP Packet Triggered Buffer Overflow (deprecated)Nessus Network MonitorSCADA
high