All the vulnerabilites related to Rockwell Automation - 1756-EN3TR Series B
var-202307-1163
Vulnerability from variot
Where this vulnerability exists in the Rockwell Automation 1756 EN2 and 1756 EN3 ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device. 1756-en2f series a firmware, 1756-en2f series b firmware, 1756-en2f series c firmware etc. Rockwell Automation The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation 1756 is a scalable controller solution from Rockwell Automation, USA. It can address a large number of I/O points.
Rockwell Automation 1756 EN2 and 1756 EN3 have a denial of service vulnerability. The vulnerability is caused by the failure to properly handle the input error message
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202307-1163", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "1756-en2tr series b", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en2t series b", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en2t series d", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en3tr series a", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en2f series c", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en2f series a", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en3tr series b", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en2tr series a", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en2t series c", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en2tr series c", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en2f series b", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en2t series a", "scope": "eq", "trust": 1.0, "vendor": "rockwellautomation", "version": null }, { "model": "1756-en2t series a", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "1756-en2tr series a", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "1756-en2f series a", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "1756-en2tr series b", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "1756-en2f series c", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "1756-en2t series c", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "1756-en2t series d", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "1756-en2t series b", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "1756-en2tr series c", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "1756-en3tr series a", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "1756-en2f series b", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "1756-en3tr series b", "scope": null, "trust": 0.8, "vendor": "rockwell automation", "version": null }, { "model": "automation en2", "scope": "eq", "trust": 0.6, "vendor": "rockwell", "version": "1756" }, { "model": "automation en3", "scope": "eq", "trust": 0.6, "vendor": "rockwell", "version": "1756" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-16842" }, { "db": "JVNDB", "id": "JVNDB-2023-023079" }, { "db": "NVD", "id": "CVE-2023-3595" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en2f_series_a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en2f_series_a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en2f_series_b_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en2f_series_b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en2f_series_c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en2f_series_c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en2t_series_a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en2t_series_a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en2t_series_b_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en2t_series_b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en2t_series_c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en2t_series_c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en2t_series_d_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en2t_series_d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_b_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en3tr_series_a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en3tr_series_a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:rockwellautomation:1756-en3tr_series_b_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-en3tr_series_b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2023-3595" } ] }, "cve": "CVE-2023-3595", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2024-16842", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2023-3595", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2023-3595", "trust": 1.8, "value": "CRITICAL" }, { "author": "PSIRT@rockwellautomation.com", "id": "CVE-2023-3595", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2024-16842", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-16842" }, { "db": "JVNDB", "id": "JVNDB-2023-023079" }, { "db": "NVD", "id": "CVE-2023-3595" }, { "db": "NVD", "id": "CVE-2023-3595" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "\nWhere this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device. 1756-en2f series a firmware, 1756-en2f series b firmware, 1756-en2f series c firmware etc. Rockwell Automation The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation 1756 is a scalable controller solution from Rockwell Automation, USA. It can address a large number of I/O points. \n\nRockwell Automation 1756 EN2 and 1756 EN3 have a denial of service vulnerability. The vulnerability is caused by the failure to properly handle the input error message", "sources": [ { "db": "NVD", "id": "CVE-2023-3595" }, { "db": "JVNDB", "id": "JVNDB-2023-023079" }, { "db": "CNVD", "id": "CNVD-2024-16842" }, { "db": "VULMON", "id": "CVE-2023-3595" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-3595", "trust": 3.9 }, { "db": "ICS CERT", "id": "ICSA-23-193-01", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU95608136", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2023-023079", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2024-16842", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2023.3937", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202307-1094", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2023-3595", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-16842" }, { "db": "VULMON", "id": "CVE-2023-3595" }, { "db": "JVNDB", "id": "JVNDB-2023-023079" }, { "db": "CNNVD", "id": "CNNVD-202307-1094" }, { "db": "NVD", "id": "CVE-2023-3595" } ] }, "id": "VAR-202307-1163", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2024-16842" } ], "trust": 1.225 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-16842" } ] }, "last_update_date": "2024-04-19T22:54:58.997000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Rockwell Automation 1756 EN2 and 1756 EN3 Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/539901" }, { "title": "Rockwell Automation 1756 EN2 and 1756 EN3 Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=246124" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-16842" }, { "db": "CNNVD", "id": "CNNVD-202307-1094" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-023079" }, { "db": "NVD", "id": "CVE-2023-3595" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-3595" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95608136/" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-193-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.3937" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2023-3595/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2024-16842" }, { "db": "VULMON", "id": "CVE-2023-3595" }, { "db": "JVNDB", "id": "JVNDB-2023-023079" }, { "db": "CNNVD", "id": "CNNVD-202307-1094" }, { "db": "NVD", "id": "CVE-2023-3595" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2024-16842" }, { "db": "VULMON", "id": "CVE-2023-3595" }, { "db": "JVNDB", "id": "JVNDB-2023-023079" }, { "db": "CNNVD", "id": "CNNVD-202307-1094" }, { "db": "NVD", "id": "CVE-2023-3595" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-04-07T00:00:00", "db": "CNVD", "id": "CNVD-2024-16842" }, { "date": "2023-07-12T00:00:00", "db": "VULMON", "id": "CVE-2023-3595" }, { "date": "2024-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-023079" }, { "date": "2023-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202307-1094" }, { "date": "2023-07-12T13:15:09.880000", "db": "NVD", "id": "CVE-2023-3595" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2024-04-07T00:00:00", "db": "CNVD", "id": "CNVD-2024-16842" }, { "date": "2023-07-12T00:00:00", "db": "VULMON", "id": "CVE-2023-3595" }, { "date": "2024-01-25T06:31:00", "db": "JVNDB", "id": "JVNDB-2023-023079" }, { "date": "2023-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202307-1094" }, { "date": "2023-07-25T19:55:53.177000", "db": "NVD", "id": "CVE-2023-3595" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202307-1094" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Rockwell\u00a0Automation\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-023079" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202307-1094" } ], "trust": 0.6 } }
cve-2023-2262
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:19:14.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140786" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:rockwellautomation:1756-en2t_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2t_series_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2t_series_c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2t_series_d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2tk_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2tk_series_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2tk_series_c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2txt_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2txt_series_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2txt_series_c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2txt_series_d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2tp_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2tpk_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2tr_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2tr_series_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2tr_series_c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2trk_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2trk_series_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2trk_series_c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2trxt_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2trxt_series_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2trxt_series_c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2f_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2f_series_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2f_series_c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2fk_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2fk_series_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2fk_series_c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en3tr_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en3tr_series_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en3trk_series_a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en3trk_series_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:1756-en2tpxt_series_a_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1756-en2fk_series_c_firmware", "vendor": "rockwellautomation", "versions": [ { "lessThanOrEqual": "5.028", "status": "affected", "version": "5.008", "versionType": "custom" }, { "lessThanOrEqual": "11.0002", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-2262", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T14:39:20.985093Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T15:44:30.367Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "1756-EN2T Series A, B, C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2T Series D", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.002" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TK Series A, B, C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TXT Series A, B, C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TXT Series D", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.002" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TP Series A", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.002" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TPK Series A", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.002" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TPXT Series A", "vendor": "Rockwell Auotmation", "versions": [ { "status": "affected", "version": "\u003c=11.002" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TR Series A, B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TR Series C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.002" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TRK Series A, B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TRK Series C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.002" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TRXT Series A, B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TRXT Series C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.002" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2F Series A, B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2F Series C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.002" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2FK Series A, B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2FK Series C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.002" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN3TR Series A", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN3TR Series B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN3TRK Series A", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN3TRK Series B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.002" } ] } ], "datePublic": "2023-09-12T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.\u003c/span\u003e\n\n\u003c/span\u003e\n\n" } ], "value": "\n\n\nA buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.\n\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-20T15:47:00.968Z", "orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell" }, "references": [ { "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140786" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cstrong\u003eUpdate firmware.\u003c/strong\u003e\u0026nbsp;Update EN2* ControlLogix communications modules to mitigated firmware.\u003cbr\u003e\u003cul\u003e\u003cli\u003eRestrict traffic to the SMTP port (25), if not needed.\u003c/li\u003e\u003cli\u003eCustomers using the EN2/EN3 versions 10.x and higher can disable the email object, if not needed. Instructions can be found in the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://literature.rockwellautomation.com/idc/groups/literature/documents/um/enet-um006_-en-p.pdf\"\u003eEtherNet/IP Network Devices User Manual (rockwellautomation.com)\u003c/a\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e, publication ENET-UM006.\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012\"\u003eQA43240 - Recommended Security Guidelines from Rockwell Automation\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\n\n" } ], "value": "Update firmware.\u00a0Update EN2* ControlLogix communications modules to mitigated firmware.\n * Restrict traffic to the SMTP port (25), if not needed.\n * Customers using the EN2/EN3 versions 10.x and higher can disable the email object, if not needed. Instructions can be found in the EtherNet/IP Network Devices User Manual (rockwellautomation.com) https://literature.rockwellautomation.com/idc/groups/literature/documents/um/enet-um006_-en-p.pdf , publication ENET-UM006.\n * QA43240 - Recommended Security Guidelines from Rockwell Automation https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012 \n\n\n\n\n" } ], "source": { "discovery": "UNKNOWN" }, "title": "Rockwell Automation Select Logix Communication Modules Vulnerable to Email Object Buffer Overflow", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "assignerShortName": "Rockwell", "cveId": "CVE-2023-2262", "datePublished": "2023-09-20T15:20:23.700Z", "dateReserved": "2023-04-24T21:35:54.200Z", "dateUpdated": "2024-09-25T15:44:30.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3595
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:01:57.031Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "1756-EN2T Series A, B, C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2T Series D", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TK Series A, B, C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TXT Series A, B, C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TXT Series D", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TP Series A", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TPK Series A", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TPXT Series A", "vendor": "Rockwell Auotmation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TR Series A, B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TR Series C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TRK Series A, B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TRK Series C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TRXT Series A, B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2TRXT Series C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2F Series A, B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2F Series C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2FK Series A, B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN2FK Series C", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN3TR Series A", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN3TR Series B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN3TRK Series A", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=5.008 \u0026 5.028" } ] }, { "defaultStatus": "unaffected", "product": "1756-EN3TRK Series B", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c=11.003" } ] } ], "datePublic": "2023-07-12T12:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eWhere this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.\u003c/span\u003e\n\n" } ], "value": "\nWhere this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.\n\n" } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-12T13:15:20.247Z", "orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell" }, "references": [ { "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cul\u003e\u003cli\u003e\u003cstrong\u003eUpdate firmware.\u003c/strong\u003e\u0026nbsp;Update EN2* ControlLogix communications modules to mitigated firmware.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eProperly segment networks.\u003c/strong\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks.\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eImplement detection signatures.\u003c/strong\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\n\n" } ], "value": "\n * Update firmware.\u00a0Update EN2* ControlLogix communications modules to mitigated firmware.\n * Properly segment networks.\u00a0Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks.\n * Implement detection signatures.\u00a0Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.\n\n\n\n\n" } ], "source": { "discovery": "UNKNOWN" }, "title": "Rockwell Automation ControlLogix Communication Modules Vulnerable to Remote Code Execution", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "assignerShortName": "Rockwell", "cveId": "CVE-2023-3595", "datePublished": "2023-07-12T12:37:01.939Z", "dateReserved": "2023-07-10T15:34:52.031Z", "dateUpdated": "2024-08-02T07:01:57.031Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }