Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2018-09-20T20:00:00Z

Updated: 2024-09-17T00:35:32.767Z

Reserved: 2018-08-01T00:00:00

Link: CVE-2018-14821

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-09-20T19:29:00.470

Modified: 2019-10-09T23:35:16.937

Link: CVE-2018-14821

cve-icon Redhat

No data.