RULE(RULE ID:712760)

Rule General Information
Release Date: 2019-01-21
Rule Name: Rockwell Automation RSLinx Classic CIP SendRRData Heap Buffer Overflow Vulnerability -3 (CVE-2018-14821)
Severity:
CVE ID:
Rule Protection Details
Description: A heap buffer overflow vulnerability exists in Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. The vulnerability is due to a flaw in the module that processes EtherNet/IP SendRRData messages. It may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.
Impact: A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to the vulnerable service. Successful exploitation could lead to buffer overflow or crash of the vulnerable application.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: https://ics-cert.us-cert.gov/advisories/ICSA-18-263-02
https://www.tenable.com/security/research/tra-2018-26
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1075747
Solutions
Rockwell has issued patches and provided users with a list of recommended actions. Read their advisory for full details.