4 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability by sending an Electronic Key Segment with less than 0x18 bytes following the Key Format field. Se presenta una vulnerabilidad de denegación de servicio explotable en la funcionalidad ENIP Request Path Logical Segment de Allen-Bradley Flex IO 1794-AENT/B versión 4.003. Una petición de red especialmente diseñada puede causar una pérdida de comunicaciones con el dispositivo resultando en una denegación de servicio. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1006 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability by sending an Electronic Key Segment with less bytes than required by the Key Format Table. Se presenta una vulnerabilidad de denegación de servicio explotable en la funcionalidad ENIP Request Path Logical Segment de Allen-Bradley Flex IO 1794-AENT/B versión 4.003. Una petición de red especialmente diseñada puede causar una pérdida de comunicaciones con el dispositivo resultando en una denegación de servicio. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1006 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability If the ANSI Extended Symbol Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required. Se presenta una vulnerabilidad de denegación de servicio explotable en la funcionalidad ENIP Request Path Data Segment de Allen-Bradley Flex IO 1794-AENT/B. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1007 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.If the Simple Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required. Se presenta una vulnerabilidad de denegación de servicio explotable en la funcionalidad ENIP Request Path Data Segment de Allen-Bradley Flex IO 1794-AENT/B. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1007 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •