Rockwell Automation 1756-ENBT/A 3.2.6 and 3.6.1 Unauthorized Memory Access

critical Nessus Network Monitor Plugin ID 720210

Synopsis

Rockwell Automation 1756-ENBT/A allows a remote attacker to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185.

Description

The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockwell Automation 1756-ENBT series A with firmware 3.2.6 and 3.6.1 and other products, allows remote attackers to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185, a related issue to CVE-2005-3804.

Solution

Perform vendor recommended mitigations and apply available vendor upgrades.

See Also

http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/enduser/std_adp.php?p_faqid=69735,http://www.kb.cert.org/vuls/id/MAPG-86EPFA,http://www.kb.cert.org/vuls/id/MAPG-86FPQL

Plugin Details

Severity: Critical

ID: 720210

Family: SCADA

Published: 5/8/2019

Updated: 9/30/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Patch Publication Date: 8/5/2010

Vulnerability Publication Date: 8/5/2010

Reference Information

CVE: CVE-2010-2965