Page 38 of 241 results (0.005 seconds)

CVSS: 8.0EPSS: 0%CPEs: 16EXPL: 0

Format String vulnerability in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. Cisco Bug IDs: CSCvd73664. Vulnerabilidad de cadena de formato en el subsistema LLDP (Link Layer Discovery Protocol) de Cisco IOS Software, Cisco IOS XE Software y Cisco IOS XR Software podría permitir que un atacante adyacente sin autenticar provoque una condición de denegación de servicio (DoS) o que ejecute código arbitrario con privilegios elevados en un dispositivo afectado. Cisco Bug IDs: CSCvd73664. Format string vulnerability in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. • http://www.securityfocus.com/bid/103564 http://www.securitytracker.com/id/1040586 https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03 https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-134: Use of Externally-Controlled Format String •

CVSS: 10.0EPSS: 1%CPEs: 12EXPL: 0

A Buffer Overflow issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers, Series B and C Versions 21.002 and earlier. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution. Se ha descubierto un problema de desbordamiento de búfer en Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers, Series B y C, en versiones 21.002 y anteriores. Se ha identificado una vulnerabilidad de desbordamiento de búfer basado en pila, lo que podría permitir la ejecución remota de código. • http://www.securityfocus.com/bid/102474 https://ics-cert.us-cert.gov/advisories/ICSA-18-009-01 https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1070883 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An Improper Input Validation issue was discovered in Rockwell Automation FactoryTalk Alarms and Events, Version 2.90 and earlier. An unauthenticated attacker with remote access to a network with FactoryTalk Alarms and Events can send a specially crafted set of packets packet to Port 403/TCP (the history archiver service), causing the service to either stall or terminate. Se ha descubierto un problema de validación de entrada incorrecta en Rockwell Automation FactoryTalk Alarms and Events, versión 2.90 y anteriores. Un atacante sin autenticar con acceso remoto a red y con FactoryTalk Alarms and Events puede enviar un paquete que incluya un grupo de paquetes manipulados al puerto 403/TCP (el servicio archivador de historiales), lo que provocaría que el servicio se bloquease o se cerrase. • http://www.securityfocus.com/bid/102114 https://ics-cert.us-cert.gov/advisories/ICSA-17-341-02 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

An Improper Input Validation issue was discovered in Rockwell Automation MicroLogix 1100 controllers 1763-L16BWA, 1763-L16AWA, 1763-L16BBB, and 1763-L16DWD. A remote, unauthenticated attacker could send a single, specially crafted Programmable Controller Communication Commands (PCCC) packet to the controller that could potentially cause the controller to enter a DoS condition. Se ha descubierto un problema de validación de entrada incorrecta en los controladores Rockwell Automation MicroLogix 1100 1763-L16BWA, 1763-L16AWA, 1763-L16BBB y 1763-L16DWD. Un atacante remoto sin autenticar podría enviar un único paquete de tipo Programmable Controller Communication Commands (PCCC) manipulado al controlador que podría provocar que el controlador entre en una denegación de servicio. A remote, unauthenticated attacker could send a single, specially crafted Programmable Controller Communication Commands (PCCC) packet to the controller that could potentially cause the controller to enter a DoS condition. • http://www.securityfocus.com/bid/99622 https://ics-cert.us-cert.gov/advisories/ICSA-17-138-03 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 22EXPL: 0

A "Reusing a Nonce, Key Pair in Encryption" issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected product reuses nonces, which may allow an attacker to capture and replay a valid request until the nonce is changed. Se detectó un problema de "Reusing a Nonce, Key Pair in Encryption" en los controladores de lógica programable MicroLogix 1100 de Allen-Bradley 1763-L16AWA, Serie A y B, Versión 16.00 y versiones anteriores; 1763-L16BBB, Serie A y B, Versión 16.00 y versiones anteriores; 1763-L16BWA, Serie A y B, Versión 16.00 y versiones anteriores; y 1763-L16DWD, Serie A y B, Versión 16.00 y versiones anteriores y Controladores lógicos programables Allen-Bradley MicroLogix 1400 1766-L32AWA, Serie A y B, Versión 16.00 y versiones anteriores; 1766-L32BWA, Series A y B, versión 16.00 y versiones anteriores; 1766-L32BWAA, Serie A y B, Versión 16.00 y versiones anteriores; 1766-L32BXB, Serie A y B, Versión 16.00 y versiones anteriores; 1766-L32BXBA, Serie A y B, Versión 16.00 y versiones anteriores; y 1766-L32AWAA, Serie A y B, Versión 16.00 y versiones anteriores. El producto afectado reutiliza nonces, lo que puede permitir que un atacante capture y reproduzca una solicitud válida hasta que se cambie el nonce. • http://www.securitytracker.com/id/1038546 https://ics-cert.us-cert.gov/advisories/ICSA-17-115-04 • CWE-323: Reusing a Nonce, Key Pair in Encryption CWE-330: Use of Insufficiently Random Values •