Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6h2q-3m5q-wv4c

Опубликовано: 01 авг. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 7.3

Описание

A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.

A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.

EPSS

Процентиль: 31%
0.00118
Низкий

7.3 High

CVSS4

Дефекты

CWE-420

Связанные уязвимости

nvd
больше 1 года назад

A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.

CVSS3: 8.4
fstec
больше 1 года назад

Уязвимость функции Trusted Slot микропрограммного обеспечения программируемых логических контроллеров Rockwell Automation 1756-EN4TR, 1756-EN2T Series A/B/C, 1756-EN2F Series A/B, 1756-EN2TR Series A/B, 1756-EN3TR Series B, 1756-EN2T Series D, 1756-EN2F Series C, 1756-EN2TR Series C, 1756-EN3TR Series B, 1756-EN2TP Series A, позволяющая нарушителю изменить пользовательские проекты и/или конфигурацию устройства

EPSS

Процентиль: 31%
0.00118
Низкий

7.3 High

CVSS4

Дефекты

CWE-420