// For flags

CVE-2013-2805

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it receives a datagram with an incorrect value in the “Record Data Size” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to an oversized value, an attacker could cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to this vulnerability can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

El software RSLinx Enterprise de Rockwell Automation (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 y CPR9-SR6 no maneja la entrada correctamente y da como resultado un error lógico si recibe un datagrama con un valor incorrecto en el campo" Record Data Size”. Al enviar un datagrama al servicio a través del puerto 4444 / UDP con el campo “Record Data Size” modificado a un valor demasiado grande, un atacante podría causar una infracción de acceso de lectura fuera de los límites que conduzca a un bloqueo del servicio. El servicio se puede recuperar con un reinicio manual. Los parches y detalles relacionados con esta vulnerabilidad se pueden encontrar en el siguiente enlace de aviso de seguridad de Rockwell Automation (se requiere inicio de sesión): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-04-11 CVE Reserved
  • 2019-03-26 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-125: Out-of-bounds Read
CAPEC
References (1)
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
5.10.00
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "5.10.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
5.10.01
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "5.10.01"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
5.20.00
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "5.20.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
5.21.00
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "5.21.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
5.30.00
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "5.30.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
5.40.00
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "5.40.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
5.50.00
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "5.50.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
5.51.00
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "5.51.00"
-
Affected
Rockwellautomation
Search vendor "Rockwellautomation"
Rslinx Enterprise
Search vendor "Rockwellautomation" for product "Rslinx Enterprise"
5.60.00
Search vendor "Rockwellautomation" for product "Rslinx Enterprise" and version "5.60.00"
-
Affected