The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.
A vulnerability was found in Rockwell Automation RSLinx Classic versions 4.10.00 and prior. An input validation issue in a .dll file of RSLinx Classic where the data in a Forward Open service request is passed to a fixed size buffer, allowing an attacker to exploit a stack-based buffer overflow condition.
Base Score: 7.5
Impact Score: 6.4
Exploitability Score: 10
Base Score: 9.8
Impact Score: 5.9
Exploitability Score: 3.9
cpe:2.3:a:rockwellautomation:rslinx:*:*:*:*:classic:*:*:* versions up to 4.10.00 (inclusive)
|500296||Rockwellautomation Rslinx Improper Restriction of Operations within the Bounds of a Memory Buffer||Tenable.ot||SCADA|
|720260||Rockwell Automation RSLinx Classic <= 4.10.00 Stack-Based Buffer Overflow||Nessus Network Monitor||SCADA|
|123010||Rockwell Automation RSLinx Classic ENGINE.dll Stack Buffer Overflow (CVE-2019-6553)||Nessus||SCADA|