Логотип exploitDog
bind:CVE-2024-6436
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-6436

Количество 3

Количество 3

nvd логотип

CVE-2024-6436

больше 1 года назад

An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-g2f6-cxmc-24cj

больше 1 года назад

An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-07700

больше 1 года назад

Уязвимость программного обеспечения управления последовательностью операций в промышленных средах Rockwell Automation Sequence Manager, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-6436

An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.

CVSS3: 6.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-g2f6-cxmc-24cj

An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.

CVSS3: 6.5
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-07700

Уязвимость программного обеспечения управления последовательностью операций в промышленных средах Rockwell Automation Sequence Manager, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 1 года назад

Уязвимостей на страницу