Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g2xj-449r-g2rx

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.

EPSS

Процентиль: 82%
0.01686
Низкий

7.5 High

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 7.5
nvd
больше 7 лет назад

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.

CVSS3: 7.5
fstec
больше 7 лет назад

Уязвимость сервера связи RSLinx Classic, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 82%
0.01686
Низкий

7.5 High

CVSS3

Дефекты

CWE-119