Page 10 of 241 results (0.005 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected device’s Modbus TCP Server AOI information. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138766 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 9EXPL: 0

The affected products are vulnerable to an integer overflow or wraparound, which could  allow an attacker to crash the server and remotely execute arbitrary code. • https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01 • CWE-190: Integer Overflow or Wraparound •

CVSS: 9.8EPSS: 0%CPEs: 9EXPL: 0

The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code. • https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01 • CWE-129: Improper Validation of Array Index •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software.  Users are granted elevated permissions on certain product services when the software is installed. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software. Existe una vulnerabilidad de ejecución remota de código en el software Rockwell Automation Studio 5000 Logix Emulate. A los usuarios se les otorgan permisos elevados sobre ciertos servicios del producto cuando se instala el software. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137846 • CWE-287: Improper Authentication •

CVSS: 8.6EPSS: 0%CPEs: 10EXPL: 0

An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online and continue normal operation. Un usuario no autorizado podría utilizar una secuencia especialmente manipulada de mensajes Ethernet/IP, combinada con una gran carga de tráfico, para provocar una condición de Denegación de Servicio (DoS) en los controladores Logix de Rockwell Automation, lo que provocaría una falla importante no recuperable. Si el dispositivo de destino deja de estar disponible, el usuario tendría que borrar la falla y volver a descargar el archivo de proyecto del usuario para volver a poner el dispositivo en línea y continuar con el funcionamiento normal. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137664 • CWE-20: Improper Input Validation •