CVE-2023-0027 – Rockwell Automation Modbus TCP AOI Server Could Leak Sensitive Information
https://notcve.org/view.php?id=CVE-2023-0027
Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected device’s Modbus TCP Server AOI information. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138766 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2023-0754
https://notcve.org/view.php?id=CVE-2023-0754
The affected products are vulnerable to an integer overflow or wraparound, which could allow an attacker to crash the server and remotely execute arbitrary code. • https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01 • CWE-190: Integer Overflow or Wraparound •
CVE-2023-0755
https://notcve.org/view.php?id=CVE-2023-0755
The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code. • https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01 • CWE-129: Improper Validation of Array Index •
CVE-2022-3156 – Rockwell Automation Studio 5000 Logix Emulate Vulnerable to a Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-3156
A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software. Users are granted elevated permissions on certain product services when the software is installed. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software. Existe una vulnerabilidad de ejecución remota de código en el software Rockwell Automation Studio 5000 Logix Emulate. A los usuarios se les otorgan permisos elevados sobre ciertos servicios del producto cuando se instala el software. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137846 • CWE-287: Improper Authentication •
CVE-2022-3752 – Rockwell Automation GuardLogix and ControlLogix controllers Vulnerable to Denial-Of-Service Attack
https://notcve.org/view.php?id=CVE-2022-3752
An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online and continue normal operation. Un usuario no autorizado podría utilizar una secuencia especialmente manipulada de mensajes Ethernet/IP, combinada con una gran carga de tráfico, para provocar una condición de Denegación de Servicio (DoS) en los controladores Logix de Rockwell Automation, lo que provocaría una falla importante no recuperable. Si el dispositivo de destino deja de estar disponible, el usuario tendría que borrar la falla y volver a descargar el archivo de proyecto del usuario para volver a poner el dispositivo en línea y continuar con el funcionamiento normal. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137664 • CWE-20: Improper Input Validation •