Description
Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected device’s Modbus TCP Server AOI information.

Published: 2023-03-17
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Customers should update their software to versions 2.04.00 and later to mitigate this issue.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-12132 Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected device’s Modbus TCP Server AOI information.
History

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Rockwellautomation Modbus Tcp Server Add On Instructions
cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2025-02-26T18:36:20.083Z

Reserved: 2022-12-29T14:01:39.460Z

Link: CVE-2023-0027

cve-icon Vulnrichment

Updated: 2024-08-02T04:54:32.559Z

cve-icon NVD

Status : Modified

Published: 2023-03-17T17:15:11.307

Modified: 2024-11-21T07:36:25.453

Link: CVE-2023-0027

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses