
CVE-2023-2263 – Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A – CIP Message Attack Could Cause Denial-Of-Service
https://notcve.org/view.php?id=CVE-2023-2263
18 Jul 2023 — The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing. The new ENIP connections cannot be established if impacted by this vulnerability, which prohibits operational capabilities of the device resulting in a denial-of-service attack. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140029 • CWE-400: Uncontrolled Resource Consumption •

CVE-2023-3596 – Rockwell Automation Allen-Bradley ControlLogix Communication Modules vulnerable to Denial of Service
https://notcve.org/view.php?id=CVE-2023-3596
12 Jul 2023 — Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010 • CWE-787: Out-of-bounds Write •

CVE-2023-3595 – Rockwell Automation ControlLogix Communication Modules Vulnerable to Remote Code Execution
https://notcve.org/view.php?id=CVE-2023-3595
12 Jul 2023 — Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010 • CWE-787: Out-of-bounds Write •

CVE-2023-2746 – Rockwell Automation Enhanced HIM Vulnerable to Cross-Site Request Forgery Attack
https://notcve.org/view.php?id=CVE-2023-2746
11 Jul 2023 — The Rockwell Automation Enhanced HIM software contains an API that the application uses that is not protected sufficiently and uses incorrect Cross-Origin Resource Sharing (CORS) settings and, as a result, is vulnerable to a Cross Site Request Forgery (CSRF) attack. To exploit this vulnerability, a malicious user would have to convince a user to click on an untrusted link through a social engineering attack or successfully perform a Cross Site Scripting Attack (XSS). Exploitation of a CSRF could potentially... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139760 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2023-2072 – Rockwell Automation PowerMonitor 1000 Cross-Site Scripting Vulnerability
https://notcve.org/view.php?id=CVE-2023-2072
11 Jul 2023 — The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-787: Out-of-bounds Write •

CVE-2023-2778 – Rockwell Automation FactoryTalk Transaction Manager Vulnerable to Denial-Of-Service
https://notcve.org/view.php?id=CVE-2023-2778
13 Jun 2023 — A denial-of-service vulnerability exists in Rockwell Automation FactoryTalk Transaction Manager. This vulnerability can be exploited by sending a modified packet to port 400. If exploited, the application could potentially crash or experience a high CPU or memory usage condition, causing intermittent application functionality issues. The application would need to be restarted to recover from the DoS. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139744 • CWE-400: Uncontrolled Resource Consumption •

CVE-2023-2639 – Rockwell Automation FactoryTalk System Services Vulnerable to Sensitive Information Disclosure
https://notcve.org/view.php?id=CVE-2023-2639
13 Jun 2023 — The underlying feedback mechanism of Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device. This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, thi... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 • CWE-346: Origin Validation Error •

CVE-2023-2638 – Rockwell Automation FactoryTalk System Services Vulnerable to a Denial-of-Service Attack
https://notcve.org/view.php?id=CVE-2023-2638
13 Jun 2023 — Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected. Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives. This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 • CWE-287: Improper Authentication •

CVE-2023-2637 – Rockwell Automation FactoryTalk System Services Vulnerable To Use Of Hard-Coded Cryptographic Key
https://notcve.org/view.php?id=CVE-2023-2637
13 Jun 2023 — Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies. Hard-coded cryptographic key may lead to privilege escalation. This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Man... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 • CWE-321: Use of Hard-coded Cryptographic Key CWE-798: Use of Hard-coded Credentials •

CVE-2023-2444
https://notcve.org/view.php?id=CVE-2023-2444
11 May 2023 — A cross site request forgery vulnerability exists in Rockwell Automation's FactoryTalk Vantagepoint. This vulnerability can be exploited in two ways. If an attacker sends a malicious link to a computer that is on the same domain as the FactoryTalk Vantagepoint server and a user clicks the link, the attacker could impersonate the legitimate user and send requests to the affected product. Additionally, if an attacker sends an untrusted link to a computer that is not on the same domain as the server and a user... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139443 • CWE-352: Cross-Site Request Forgery (CSRF) •