Rockwell Automation Select Communication Modules (CVE-2023-3596)

high Tenable OT Security Plugin ID 501228


The remote OT asset is affected by a vulnerability.


A vulnerability exists in the 1756-EN4* products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.

This plugin only works with Tenable.ot.
Please visit for more information.


The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at

Rockwell Automation has released the following versions to fix these vulnerabilities and can be addressed by performing a standard firmware update. Customers are strongly encouraged to implement the risk mitigations provided below and to the extent possible, to combine these with the security best practices to employ multiple strategies simultaneously.

See Also

Plugin Details

Severity: High

ID: 501228

Version: 1.7

Type: remote

Family: Tenable.ot

Published: 7/12/2023

Updated: 11/30/2023

Risk Information


Risk Factor: Medium

Score: 5.1


Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2023-3596


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:rockwellautomation:1756-en4tr_series_a_firmware, cpe:/o:rockwellautomation:1756-en4trk_series_a_firmware, cpe:/o:rockwellautomation:1756-en4trxt_series_a_firmware

Required KB Items: Tenable.ot/Rockwell

Exploit Ease: No known exploits are available

Patch Publication Date: 7/1/2023

Vulnerability Publication Date: 7/12/2023

Reference Information

CVE: CVE-2023-3596

CWE: 787