16 results (0.004 seconds)

CVSS: 8.7EPSS: 0%CPEs: 21EXPL: 0

14 Oct 2024 — CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running. • https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1707.html • CWE-20: Improper Input Validation •

CVSS: 8.7EPSS: 0%CPEs: 11EXPL: 0

12 Sep 2024 — A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover. • https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1963.html • CWE-20: Improper Input Validation •

CVSS: 8.6EPSS: 0%CPEs: 3EXPL: 0

15 Apr 2024 — A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices. Un tipo de paquete fragmentado con forma... • https://www.rockwellautomation.com/en-us/support/advisory.SD1666.html • CWE-20: Improper Input Validation •

CVSS: 8.6EPSS: 0%CPEs: 10EXPL: 0

19 Dec 2022 — An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online and continue normal operation. Un usuario no autorizado podría utilizar una secuencia especialmente manipulada de mensa... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137664 • CWE-20: Improper Input Validation •

CVSS: 8.6EPSS: 0%CPEs: 12EXPL: 0

16 Dec 2022 — A vulnerability exists in the Rockwell Automation controllers that allows a malformed CIP request to cause a major non-recoverable fault (MNRF) and a denial-of-service condition (DOS). Existe una vulnerabilidad en los controladores de Rockwell Automation que permite que una solicitud CIP con formato incorrecto cause una falla mayor no recuperable (MNRF) y una condición de Denegación de Servicio (DoS) (DOS). • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137757 • CWE-20: Improper Input Validation •

CVSS: 8.6EPSS: 0%CPEs: 18EXPL: 0

27 Jul 2022 — The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop. This may allow an attacker to send specially crafted CIP packet requests to a controller, which may cause denial-of-service conditions in communications with other products. El algoritmo de establecimiento de conexión encontrado en Rockwell Automation CompactLogix 5370 and ControlLogix 5570... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1130398 • CWE-20: Improper Input Validation •

CVSS: 8.6EPSS: 0%CPEs: 18EXPL: 0

31 May 2022 — A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online. Un mensaje de protocolo industrial común de clase 3 malformado con una conexión en caché puede causar una condición de denegación de servicio en los controlad... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1135559 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 10.0EPSS: 0%CPEs: 48EXPL: 0

11 Apr 2022 — An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change one and not the other. Un atacante con la capacidad de modificar un programa de usuario puede cambiar el código del programa de usuario en algunos sistemas ControlLogix, CompactLogix y GuardLogix Control. Studio 5... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-05 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •

CVSS: 7.7EPSS: 0%CPEs: 10EXPL: 0

01 Apr 2022 — Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user. Rockwell Automation Studio 5000 Logix Designer (todas las versiones) son vulnerables cuando un atacante que logra acceso de administrador en una estación de trabajo que ejecuta Studio 5000 Logix Designer podría inyectar código de controlador no detectable para un usuario • https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-07 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 8EXPL: 0

01 May 2019 — An attacker could send a crafted HTTP/HTTPS request to render the web server unavailable and/or lead to remote code execution caused by a stack-based buffer overflow vulnerability. A cold restart is required for recovering CompactLogix 5370 L1, L2, and L3 Controllers, Compact GuardLogix 5370 controllers, and Armor Compact GuardLogix 5370 Controllers Versions 20 - 30 and earlier. Un atacante podría enviar una petición HTTP/HTTPS creada para hacer que el servidor web no esté disponible y/o provocar una ejecuc... • http://www.securityfocus.com/bid/108118 • CWE-400: Uncontrolled Resource Consumption CWE-787: Out-of-bounds Write •