Lucene search

K
cvelistIcscertCVELIST:CVE-2018-14821
HistorySep 20, 2018 - 8:00 p.m.

CVE-2018-14821

2018-09-2020:00:00
CWE-122
icscert
www.cve.org
7

AI Score

7.9

Confidence

High

EPSS

0.01

Percentile

84.1%

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.

CNA Affected

[
  {
    "product": "RSLinx Classic",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "4.00.01 and prior"
      }
    ]
  }
]

AI Score

7.9

Confidence

High

EPSS

0.01

Percentile

84.1%

Related for CVELIST:CVE-2018-14821