// For flags

CVE-2023-1834

Rockwell Automation Kinetix 5500 Vulnerable to Open Port Exploitation

Severity Score

9.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running v7.13 may have the telnet and FTP ports open by default.  This could potentially allow attackers unauthorized access to the device through the open ports.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-04-04 CVE Reserved
  • 2023-05-11 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-10-21 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-284: Improper Access Control
CAPEC
  • CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rockwellautomation
Search vendor "Rockwellautomation"
Kinetix 5500 Firmware
Search vendor "Rockwellautomation" for product "Kinetix 5500 Firmware"
7.13
Search vendor "Rockwellautomation" for product "Kinetix 5500 Firmware" and version "7.13"
-
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
Kinetix 5500
Search vendor "Rockwellautomation" for product "Kinetix 5500"
--
Safe