Page 2 of 12 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 5EXPL: 0

The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product’s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services. Existe la posibilidad de que la contraseña del producto se use para restringir el acceso no autorizado a los controladores Rockwell PLC5 / SLC5 / 0x / RSLogix 1785-Lx y 1747-L5x. Existe la posibilidad de que un cliente de programación y configuración no autorizado obtenga acceso al producto y permita cambios en la configuración o el programa del producto. • https://ics-cert.us-cert.gov/advisories/ICSA-10-070-02 • CWE-255: Credentials Management Errors CWE-284: Improper Access Control •

CVSS: 10.0EPSS: 0%CPEs: 101EXPL: 0

An issue was discovered in Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 through 21.00 (excluding all firmware versions prior to FRN 16.00, which are not affected). By sending malformed common industrial protocol (CIP) packet, an attacker may be able to overflow a stack-based buffer and execute code on the controller or initiate a nonrecoverable fault resulting in a denial of service. Ha sido descubierto un problema en Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 a 21.00 (excluyendo todas las versiones de firmware anteriores a FRN 16.00, que no se ven afectadas). Al enviar un paquete de protocolo industrial común (CIP) malformado, un atacante puede realizar un desbordamiento de búfer basado en pila y ejecutar código en el controlador o iniciar un fallo irrecuperable que da como resultado una denegación de servicio. • http://www.securityfocus.com/bid/95304 https://ics-cert.us-cert.gov/advisories/ICSA-16-343-05 • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 2%CPEs: 5EXPL: 0

Buffer overflow in Rockwell Automation RSLogix Micro Starter Lite, RSLogix Micro Developer, RSLogix 500 Starter Edition, RSLogix 500 Standard Edition, and RSLogix 500 Professional Edition allows remote attackers to execute arbitrary code via a crafted RSS project file. Desbordamiento de búfer en Rockwell Automation RSLogix Micro Starter Lite, RSLogix Micro Developer, RSLogix 500 Starter Edition, RSLogix 500 Standard Edition y RSLogix 500 Professional Edition permite a atacantes remotos ejecutar código arbitrario a través de un archivo de proyecto RSS manipulado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Rockwell Automation RSLogix Micro Starter Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of a RSS (project) file. The issue lies in the failure to properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. • http://www.securityfocus.com/bid/92983 https://ics-cert.us-cert.gov/advisories/ICSA-16-224-02 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.9EPSS: 0%CPEs: 5EXPL: 0

Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password protection for .ACD files (aka project files), which allows local users to obtain sensitive information or modify data via unspecified vectors. Rockwell Automation RSLogix 5000 7 hasta 20.01 y 21.0, no implementa debidamente la protección por contraseña de archivos .ACD (también conocidos como archivos de proyecto), lo cual permite a usuarios locales obtener información sensible o modificar datos a través de vectores no especificados. • http://ics-cert.us-cert.gov/advisories/ICSA-14-021-01 http://osvdb.org/102858 http://www.securityfocus.com/bid/65337 https://exchange.xforce.ibmcloud.com/vulnerabilities/90981 • CWE-255: Credentials Management Errors •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet. El servicio FactoryTalk (FT) RNADiagReceiver en Rockwell Automation Allen-Bradley FactoryTalk CPR9 hasta SR5 y RSLogix 5000 17 hasta 20 permite a atacantes remotos provocar una denegación de servicio (lectura fuera del límite) a través de un paquete manipulado. • http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937 http://www.us-cert.gov/control_systems/pdf/ICSA-12-088-01.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •