Rockwell Automation/Allen-Bradley Ethernet/IP Products Improper Input Validation

high Nessus Network Monitor Plugin ID 720026

Synopsis

Rockwell Automation EtherNet/IP products do not properly validate CIP packet data which could lead to a denial of service condition.

Description

Buffer overflow in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows remote attackers to cause a denial of service (NIC crash and communication outage) via a malformed CIP packet.

Solution

Perform vendor recommended mitigations and apply available vendor upgrades.

See Also

http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf,https://ics-cert.us-cert.gov/advisories/ICSA-13-011-03

Plugin Details

Severity: High

ID: 720026

Family: SCADA

Published: 5/8/2019

Updated: 9/30/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

Patch Publication Date: 1/10/2013

Vulnerability Publication Date: 1/10/2013

Reference Information

CVE: CVE-2012-6438