Логотип exploitDog
bind:CVE-2023-3595
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-3595

Количество 3

Количество 3

nvd логотип

CVE-2023-3595

больше 2 лет назад

Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-qvv4-3g8f-rgjx

больше 2 лет назад

Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2023-03948

больше 2 лет назад

Уязвимость микропрограммного обеспечения коммуникационных модулей Rockwell Automation 1756-EN2T, 1756-EN2TK, 1756-EN2TXT, 1756-EN2TP, 1756-EN2TPK, 1756-EN2TPXT, 1756-EN2TR, 1756-EN2TRK, 1756-EN2TRXT, 1756-EN2F, 1756-EN2FK, 1756-EN3TR, 1756-EN3TRK, 1756-EN4TR, 1756-EN4TRK, 1756-EN4TRXT контроллеров Allen-Bradley серии ControlLogix 1756, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-3595

Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

CVSS3: 9.8
12%
Средний
больше 2 лет назад
github логотип
GHSA-qvv4-3g8f-rgjx

Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

CVSS3: 9.8
12%
Средний
больше 2 лет назад
fstec логотип
BDU:2023-03948

Уязвимость микропрограммного обеспечения коммуникационных модулей Rockwell Automation 1756-EN2T, 1756-EN2TK, 1756-EN2TXT, 1756-EN2TP, 1756-EN2TPK, 1756-EN2TPXT, 1756-EN2TR, 1756-EN2TRK, 1756-EN2TRXT, 1756-EN2F, 1756-EN2FK, 1756-EN3TR, 1756-EN3TRK, 1756-EN4TR, 1756-EN4TRK, 1756-EN4TRXT контроллеров Allen-Bradley серии ControlLogix 1756, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
12%
Средний
больше 2 лет назад

Уязвимостей на страницу