Rockwell Automation 1756-ENBT/A 3.2.6 and 3.6.1 Unauthorized Memory Access

Critical Nessus Network Monitor Plugin ID 720210

Synopsis

Rockwell Automation 1756-ENBT/A allows a remote attacker to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185.

Description

The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockwell Automation 1756-ENBT series A with firmware 3.2.6 and 3.6.1 and other products, allows remote attackers to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185, a related issue to CVE-2005-3804.

Solution

Perform vendor recommended mitigations and apply available vendor upgrades.

See Also

http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/enduser/std_adp.php?p_faqid=69735

http://www.kb.cert.org/vuls/id/MAPG-86EPFA

http://www.kb.cert.org/vuls/id/MAPG-86FPQL

Plugin Details

Severity: Critical

ID: 720210

Family: SCADA

Published: 2019/05/08

Updated: 2019/09/30

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

Patch Publication Date: 2010/08/05

Vulnerability Publication Date: 2010/08/05

Reference Information

CVE: CVE-2010-2965