A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.
Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.04482.
Exploitation none
Automatable yes
Technical Impact total
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Rockwellautomation
Subscribe
|
1756-en2f Series A
Subscribe
1756-en2f Series A Firmware
Subscribe
1756-en2f Series B
Subscribe
1756-en2f Series B Firmware
Subscribe
1756-en2f Series C
Subscribe
1756-en2f Series C Firmware
Subscribe
1756-en2fk Series A
Subscribe
1756-en2fk Series A Firmware
Subscribe
1756-en2fk Series B
Subscribe
1756-en2fk Series B Firmware
Subscribe
1756-en2fk Series C
Subscribe
1756-en2fk Series C Firmware
Subscribe
1756-en2t Series A
Subscribe
1756-en2t Series A Firmware
Subscribe
1756-en2t Series B
Subscribe
1756-en2t Series B Firmware
Subscribe
1756-en2t Series C
Subscribe
1756-en2t Series C Firmware
Subscribe
1756-en2t Series D
Subscribe
1756-en2t Series D Firmware
Subscribe
1756-en2tk Series A
Subscribe
1756-en2tk Series A Firmware
Subscribe
1756-en2tk Series B
Subscribe
1756-en2tk Series B Firmware
Subscribe
1756-en2tk Series C
Subscribe
1756-en2tk Series C Firmware
Subscribe
1756-en2tp Series A
Subscribe
1756-en2tp Series A Firmware
Subscribe
1756-en2tpk Series A
Subscribe
1756-en2tpk Series A Firmware
Subscribe
1756-en2tpxt Series A
Subscribe
1756-en2tpxt Series A Firmware
Subscribe
1756-en2tr Series A
Subscribe
1756-en2tr Series A Firmware
Subscribe
1756-en2tr Series B
Subscribe
1756-en2tr Series B Firmware
Subscribe
1756-en2tr Series C
Subscribe
1756-en2tr Series C Firmware
Subscribe
1756-en2trk Series A
Subscribe
1756-en2trk Series A Firmware
Subscribe
1756-en2trk Series B
Subscribe
1756-en2trk Series B Firmware
Subscribe
1756-en2trk Series C
Subscribe
1756-en2trk Series C Firmware
Subscribe
1756-en2trxt Series A
Subscribe
1756-en2trxt Series A Firmware
Subscribe
1756-en2trxt Series B
Subscribe
1756-en2trxt Series B Firmware
Subscribe
1756-en2trxt Series C
Subscribe
1756-en2trxt Series C Firmware
Subscribe
1756-en2txt Series A
Subscribe
1756-en2txt Series A Firmware
Subscribe
1756-en2txt Series B
Subscribe
1756-en2txt Series B Firmware
Subscribe
1756-en2txt Series C
Subscribe
1756-en2txt Series C Firmware
Subscribe
1756-en2txt Series D
Subscribe
1756-en2txt Series D Firmware
Subscribe
1756-en3tr Series A
Subscribe
1756-en3tr Series A Firmware
Subscribe
1756-en3tr Series B
Subscribe
1756-en3tr Series B Firmware
Subscribe
1756-en3trk Series A
Subscribe
1756-en3trk Series A Firmware
Subscribe
1756-en3trk Series B
Subscribe
1756-en3trk Series B Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33768 | A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device. |
Solution
Update firmware. Update EN2* ControlLogix communications modules to mitigated firmware. * Restrict traffic to the SMTP port (25), if not needed. * Customers using the EN2/EN3 versions 10.x and higher can disable the email object, if not needed. Instructions can be found in the EtherNet/IP Network Devices User Manual (rockwellautomation.com) https://literature.rockwellautomation.com/idc/groups/literature/documents/um/enet-um006_-en-p.pdf , publication ENET-UM006. * QA43240 - Recommended Security Guidelines from Rockwell Automation https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012
Workaround
No workaround given by the vendor.
Wed, 25 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-09-25T15:44:30.367Z
Reserved: 2023-04-24T21:35:54.200Z
Link: CVE-2023-2262
Updated: 2024-08-02T06:19:14.686Z
Status : Modified
Published: 2023-09-20T16:15:12.257
Modified: 2024-11-21T07:58:15.763
Link: CVE-2023-2262
No data.
OpenCVE Enrichment
No data.
EUVD