Lucene search

K
vulnrichmentRockwellVULNRICHMENT:CVE-2024-3493
HistoryApr 15, 2024 - 9:17 p.m.

CVE-2024-3493 Rockwell Automation ControlLogix and GaurdLogix Vulnerable to Major Nonrecoverable Fault Due to Invalid Header Value

2024-04-1521:17:36
CWE-20
Rockwell
github.com
2
cve-2024-3493
fragmented packets
invalid header
manual restart
loss of control

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automationā€™s ControlLogix 5580, Guard LogixĀ 5580,Ā CompactLogix 5380,Ā and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:35.011:*:*:*:*:*:*:*"
    ],
    "vendor": "rockwellautomation",
    "product": "guardlogix_5580_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "35.011"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:5.001:*:*:*:*:*:*:*"
    ],
    "vendor": "rockwellautomation",
    "product": "compactlogix_5380_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "35.011"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:rockwellautomation:1756-en4tr_firmware:5.001:*:*:*:*:*:*:*"
    ],
    "vendor": "rockwellautomation",
    "product": "1756-en4tr_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "5.001"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:rockwellautomation:1756-en4tr_firmware:5.001:*:*:*:*:*:*:*"
    ],
    "vendor": "rockwellautomation",
    "product": "1756-en4tr_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "5.001"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-3493