Rockwell.Automation.RSLinx.Classic.TypeLength.Buffer.Overflow

description-logoDescription

This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Rockwell Automation RSLinx Classic.
The vulnerability is caused by an error when the vulnerable software handles malformed CIP packet. It allows a remote attacker to crash vulnerable systems via sending a crafted packet to port 44818.

affected-products-logoAffected Products

RSLinx Classic Versions 4.00.01 and prior.

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-02-05 14.542 Default_action:pass:drop
2019-01-18 14.527 Sig Added
2018-12-14 13.509

References

ICSA-18-263-02