Rockwell.Automation.RSLinx.Classic.TypeLength.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Rockwell Automation RSLinx Classic.
The vulnerability is caused by an error when the vulnerable software handles malformed CIP packet. It allows a remote attacker to crash vulnerable systems via sending a crafted packet to port 44818.
Affected Products
RSLinx Classic Versions 4.00.01 and prior.
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to vendor website for suggested workaround.
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1075712
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1075747
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-02-05 | 14.542 | Default_action:pass:drop |
2019-01-18 | 14.527 | Sig Added |
2018-12-14 | 13.509 |