Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.
File data ot_500156.nasl
Vendor | Product | Version | CPE |
---|---|---|---|
rockwellautomation | rslinx | * | cpe:2.3:a:rockwellautomation:rslinx:*:*:*:*:classic:*:*:* |