Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.
[
{
"product": "RSLinx Classic",
"vendor": "Rockwell Automation",
"versions": [
{
"status": "affected",
"version": "4.00.01 and prior"
}
]
}
]