CVE-2023-27854 – Rockwell Automation Arena® Simulation Out of Bounds Read Vulnerability
https://notcve.org/view.php?id=CVE-2023-27854
An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow. The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. The user would need to open a malicious file provided to them by the attacker for the code to execute. Se informó a Rockwell Automation en Arena Simulation de una vulnerabilidad de ejecución de código arbitrario que potencialmente podría permitir que un usuario malintencionado envíe código arbitrario no autorizado al software mediante el uso de un desbordamiento del búfer de memoria. El actor de la amenaza podría entonces ejecutar código malicioso en el sistema afectando la confidencialidad, integridad y disponibilidad del producto. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141145 • CWE-125: Out-of-bounds Read •
CVE-2023-46289 – Rockwell Automation FactoryTalk® View Site Edition Vulnerable to Improper Input Validation
https://notcve.org/view.php?id=CVE-2023-46289
Rockwell Automation FactoryTalk View Site Edition insufficiently validates user input, which could potentially allow threat actors to send malicious data bringing the product offline. If exploited, the product would become unavailable and require a restart to recover resulting in a denial-of-service condition. Rockwell Automation FactoryTalk View Site Edition no valida suficientemente la entrada del usuario, lo que podría permitir que los actores de amenazas envíen datos maliciosos y desconecten el producto. Si se explota, el producto dejaría de estar disponible y requeriría un reinicio para recuperarse, lo que provocaría una condición de Denegación de Servicio (DoS). • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141167 • CWE-20: Improper Input Validation •
CVE-2023-46290 – Rockwell Automation FactoryTalk Services Platform Elevated Privileges Vulnerability
https://notcve.org/view.php?id=CVE-2023-46290
Due to inadequate code logic, a previously unauthenticated threat actor could potentially obtain a local Windows OS user token through the FactoryTalk® Services Platform web service and then use the token to log in into FactoryTalk® Services Platform . This vulnerability can only be exploited if the authorized user did not previously log in into the FactoryTalk® Services Platform web service. Debido a una lógica de código inadecuada, un actor de amenazas no autenticado previamente podría obtener un token de usuario del sistema operativo Windows local a través del servicio web FactoryTalk® Services Platform y luego usar el token para iniciar sesión en FactoryTalk® Services Platform. Esta vulnerabilidad solo se puede aprovechar si el usuario autorizado no inició sesión previamente en el servicio web FactoryTalk® Services Platform. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141165 • CWE-287: Improper Authentication •
CVE-2023-29464 – Rockwell Automation FactoryTalk Linx Vulnerable to Denial-of-Service and Information Disclosure
https://notcve.org/view.php?id=CVE-2023-29464
FactoryTalk Linx, in the Rockwell Automation PanelView Plus, allows an unauthenticated threat actor to read data from memory via crafted malicious packets. Sending a size larger than the buffer size results in leakage of data from memory resulting in an information disclosure. If the size is large enough, it causes communications over the common industrial protocol to become unresponsive to any type of packet, resulting in a denial-of-service to FactoryTalk Linx over the common industrial protocol. FactoryTalk Linx, en Rockwell Automation PanelView Plus, permite que un actor de amenazas no autenticado lea datos de la memoria a través de paquetes maliciosos manipulados. Enviar un tamaño mayor que el tamaño del búfer da como resultado una fuga de datos de la memoria, lo que resulta en una divulgación de información. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141040 • CWE-20: Improper Input Validation CWE-787: Out-of-bounds Write •
CVE-2023-2262 – Rockwell Automation Select Logix Communication Modules Vulnerable to Email Object Buffer Overflow
https://notcve.org/view.php?id=CVE-2023-2262
A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device. Existe una vulnerabilidad de Desbordamiento del Búfer en determinados dispositivos de comunicación 1756-EN* de Rockwell Automation. Si se explota, un actor de amenazas podría aprovechar esta vulnerabilidad para realizar una ejecución remota de código. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140786 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •