Rockwell.Automation.RSLinx.Classic.CIP.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Rockwell Automation RSLinx Classic.
The vulnerability is due to insufficient validation when the vulnerable software handles a malformed CIP packet. A remote attacker may be able to exploit this to execute arbitrary code within the context of the user process or cause denial of service conditions, via a crafted CIP request.
Affected Products
Rockwell Automation RSLinx Classic 4.00.01 and prior
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Upgrade to the latest version, available from the website (login required):
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1075712
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-06 | 14.627 | Severity:high:critical |
2019-03-12 | 14.571 | Default_action:pass:drop |
2019-02-20 | 14.557 | Sig Added |
2019-01-31 | 14.539 |