CVE-2020-27253
https://notcve.org/view.php?id=CVE-2020-27253
A flaw exists in the Ingress/Egress checks routine of FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to specifically craft a malicious packet resulting in a denial-of-service condition on the device. Se presenta un fallo en la rutina de comprobación de Ingresos y Egresos de FactoryTalk Linx Versiones 6.11 y anteriores. Esta vulnerabilidad podría permitir a un atacante remoto, no autenticado, diseñar específicamente un paquete malicioso resultando en una condición de denegación de servicio en el dispositivo • https://us-cert.cisa.gov/ics/advisories/icsa-20-329-01 • CWE-20: Improper Input Validation •
CVE-2020-6085
https://notcve.org/view.php?id=CVE-2020-6085
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability by sending an Electronic Key Segment with less than 0x18 bytes following the Key Format field. Se presenta una vulnerabilidad de denegación de servicio explotable en la funcionalidad ENIP Request Path Logical Segment de Allen-Bradley Flex IO 1794-AENT/B versión 4.003. Una petición de red especialmente diseñada puede causar una pérdida de comunicaciones con el dispositivo resultando en una denegación de servicio. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1006 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2020-6084
https://notcve.org/view.php?id=CVE-2020-6084
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability by sending an Electronic Key Segment with less bytes than required by the Key Format Table. Se presenta una vulnerabilidad de denegación de servicio explotable en la funcionalidad ENIP Request Path Logical Segment de Allen-Bradley Flex IO 1794-AENT/B versión 4.003. Una petición de red especialmente diseñada puede causar una pérdida de comunicaciones con el dispositivo resultando en una denegación de servicio. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1006 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2020-6083
https://notcve.org/view.php?id=CVE-2020-6083
An exploitable denial of service vulnerability exists in the ENIP Request Path Port Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability. Se presenta una vulnerabilidad de denegación de servicio explotable en la funcionalidad ENIP Request Path Port Segment de Allen-Bradley Flex IO 1794-AENT/ B. Una petición de red especialmente diseñada puede causar una pérdida de comunicaciones con el dispositivo resultando en una denegación de servicio. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1005 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2020-6087
https://notcve.org/view.php?id=CVE-2020-6087
An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability If the ANSI Extended Symbol Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required. Se presenta una vulnerabilidad de denegación de servicio explotable en la funcionalidad ENIP Request Path Data Segment de Allen-Bradley Flex IO 1794-AENT/B. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1007 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •