|
|||
Rule General Information |
---|
Release Date: | 2019-01-21 | |
Rule Name: | MISC Rockwell Automation RSLinx Classic CIP SendRRData Heap Buffer Overflow Vulnerability -1 (CVE-2018-14821) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | A heap buffer overflow vulnerability exists in Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. The vulnerability is due to a flaw in the module that processes EtherNet/IP SendRRData messages. It may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality. | |
Impact: | A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to the vulnerable service. Successful exploitation could lead to buffer overflow or crash of the vulnerable application. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | https://ics-cert.us-cert.gov/advisories/ICSA-18-263-02 https://www.tenable.com/security/research/tra-2018-26 https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1075747 |
|
Solutions |
---|
Rockwell has issued patches and provided users with a list of recommended actions. Read their advisory for full details. |