7.8 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.6 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
44.8%
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the โEnd of Current Recordโ field. By sending a datagram to the service over Port 4444/UDP with the โRecord Data Sizeโ field modified to a specifically oversized value, the service will calculate an undersized value for the โTotal Record Size.โ Then the service will calculate an incorrect value for the โEnd of Current Recordโ field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599
[
{
"product": "RSLinx Enterprise Software",
"vendor": "Rockwell Automation",
"versions": [
{
"status": "affected",
"version": "CPR9"
},
{
"status": "affected",
"version": "CPR9-SR1"
},
{
"status": "affected",
"version": "CPR9-SR2"
},
{
"status": "affected",
"version": "CPR9-SR3"
},
{
"status": "affected",
"version": "CPR9-SR4"
},
{
"status": "affected",
"version": "CPR9-SR5"
},
{
"status": "affected",
"version": "CPR9-SR5.1"
},
{
"status": "affected",
"version": "CPR9-SR6"
}
]
}
]
7.8 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.6 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
44.8%