Description
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.
Published: 2018-09-20
Score: 7.5 High
EPSS: 1.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-6705 Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.
History

No history.

Subscriptions

Rockwellautomation Rslinx
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-17T00:35:32.767Z

Reserved: 2018-08-01T00:00:00.000Z

Link: CVE-2018-14821

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-09-20T19:29:00.470

Modified: 2024-11-21T03:49:52.050

Link: CVE-2018-14821

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses