Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Changed
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.00069.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Rockwellautomation
Subscribe
|
1768 Compact Guardlogix L4xs Controller
Subscribe
1768 Compact Guardlogix L4xs Controller Firmware
Subscribe
1768 Compactlogix L4x Controller
Subscribe
1768 Compactlogix L4x Controller Firmware
Subscribe
1769 Compactlogix 5370 L1 Controller
Subscribe
1769 Compactlogix 5370 L1 Controller Firmware
Subscribe
1769 Compactlogix 5370 L2 Controller
Subscribe
1769 Compactlogix 5370 L2 Controller Firmware
Subscribe
1769 Compactlogix 5370 L3 Controller
Subscribe
1769 Compactlogix 5370 L3 Controller Firmware
Subscribe
1769 Compactlogix L23x Controller
Subscribe
1769 Compactlogix L23x Controller Firmware
Subscribe
1769 Compactlogix L3x Controller
Subscribe
1769 Compactlogix L3x Controller Firmware
Subscribe
Controllogix 5560 Controller
Subscribe
Controllogix 5560 Controller Firmware
Subscribe
Controllogix 5560 Redundant Controller
Subscribe
Controllogix 5560 Redundant Controller Firmware
Subscribe
Controllogix 5570 Controller
Subscribe
Controllogix 5570 Controller Firmware
Subscribe
Controllogix 5570 Redundant Controller
Subscribe
Controllogix 5570 Redundant Controller Firmware
Subscribe
Controllogix L55 Controller
Subscribe
Controllogix L55 Controller Firmware
Subscribe
Flexlogix L34 Controller
Subscribe
Flexlogix L34 Controller Firmware
Subscribe
Guardlogix 5570 Controller
Subscribe
Guardlogix 5570 Controller Firmware
Subscribe
Rslogix Emulate 5000
Subscribe
Rslogix Emulate 5000 Firmware
Subscribe
Softlogix 5800 Controller
Subscribe
Softlogix 5800 Controller Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-10153 | An issue was discovered in Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 through 21.00 (excluding all firmware versions prior to FRN 16.00, which are not affected). By sending malformed common industrial protocol (CIP) packet, an attacker may be able to overflow a stack-based buffer and execute code on the controller or initiate a nonrecoverable fault resulting in a denial of service. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-06T02:50:38.224Z
Reserved: 2016-11-16T00:00:00
Link: CVE-2016-9343
No data.
Status : Deferred
Published: 2017-02-13T21:59:01.707
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-9343
No data.
OpenCVE Enrichment
No data.
EUVD