Description



A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.



Published: 2023-09-20
Score: 9.8 Critical
EPSS: 4.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Update firmware. Update EN2* ControlLogix communications modules to mitigated firmware. * Restrict traffic to the SMTP port (25), if not needed. * Customers using the EN2/EN3 versions 10.x and higher can disable the email object, if not needed. Instructions can be found in the EtherNet/IP Network Devices User Manual (rockwellautomation.com) https://literature.rockwellautomation.com/idc/groups/literature/documents/um/enet-um006_-en-p.pdf , publication ENET-UM006. * QA43240 - Recommended Security Guidelines from Rockwell Automation https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-33768 A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.
History

Wed, 25 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Rockwellautomation 1756-en2f Series A 1756-en2f Series A Firmware 1756-en2f Series B 1756-en2f Series B Firmware 1756-en2f Series C 1756-en2f Series C Firmware 1756-en2fk Series A 1756-en2fk Series A Firmware 1756-en2fk Series B 1756-en2fk Series B Firmware 1756-en2fk Series C 1756-en2fk Series C Firmware 1756-en2t Series A 1756-en2t Series A Firmware 1756-en2t Series B 1756-en2t Series B Firmware 1756-en2t Series C 1756-en2t Series C Firmware 1756-en2t Series D 1756-en2t Series D Firmware 1756-en2tk Series A 1756-en2tk Series A Firmware 1756-en2tk Series B 1756-en2tk Series B Firmware 1756-en2tk Series C 1756-en2tk Series C Firmware 1756-en2tp Series A 1756-en2tp Series A Firmware 1756-en2tpk Series A 1756-en2tpk Series A Firmware 1756-en2tpxt Series A 1756-en2tpxt Series A Firmware 1756-en2tr Series A 1756-en2tr Series A Firmware 1756-en2tr Series B 1756-en2tr Series B Firmware 1756-en2tr Series C 1756-en2tr Series C Firmware 1756-en2trk Series A 1756-en2trk Series A Firmware 1756-en2trk Series B 1756-en2trk Series B Firmware 1756-en2trk Series C 1756-en2trk Series C Firmware 1756-en2trxt Series A 1756-en2trxt Series A Firmware 1756-en2trxt Series B 1756-en2trxt Series B Firmware 1756-en2trxt Series C 1756-en2trxt Series C Firmware 1756-en2txt Series A 1756-en2txt Series A Firmware 1756-en2txt Series B 1756-en2txt Series B Firmware 1756-en2txt Series C 1756-en2txt Series C Firmware 1756-en2txt Series D 1756-en2txt Series D Firmware 1756-en3tr Series A 1756-en3tr Series A Firmware 1756-en3tr Series B 1756-en3tr Series B Firmware 1756-en3trk Series A 1756-en3trk Series A Firmware 1756-en3trk Series B 1756-en3trk Series B Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-09-25T15:44:30.367Z

Reserved: 2023-04-24T21:35:54.200Z

Link: CVE-2023-2262

cve-icon Vulnrichment

Updated: 2024-08-02T06:19:14.686Z

cve-icon NVD

Status : Modified

Published: 2023-09-20T16:15:12.257

Modified: 2024-11-21T07:58:15.763

Link: CVE-2023-2262

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses