A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Rockwellautomation
Subscribe
|
1756-en2f Series A
Subscribe
1756-en2f Series A Firmware
Subscribe
1756-en2f Series B
Subscribe
1756-en2f Series B Firmware
Subscribe
1756-en2f Series C
Subscribe
1756-en2f Series C Firmware
Subscribe
1756-en2fk Series A
Subscribe
1756-en2fk Series A Firmware
Subscribe
1756-en2fk Series B
Subscribe
1756-en2fk Series B Firmware
Subscribe
1756-en2fk Series C
Subscribe
1756-en2fk Series C Firmware
Subscribe
1756-en2t Series A
Subscribe
1756-en2t Series A Firmware
Subscribe
1756-en2t Series B
Subscribe
1756-en2t Series B Firmware
Subscribe
1756-en2t Series C
Subscribe
1756-en2t Series C Firmware
Subscribe
1756-en2t Series D
Subscribe
1756-en2t Series D Firmware
Subscribe
1756-en2tk Series A
Subscribe
1756-en2tk Series A Firmware
Subscribe
1756-en2tk Series B
Subscribe
1756-en2tk Series B Firmware
Subscribe
1756-en2tk Series C
Subscribe
1756-en2tk Series C Firmware
Subscribe
1756-en2tp Series A
Subscribe
1756-en2tp Series A Firmware
Subscribe
1756-en2tpk Series A
Subscribe
1756-en2tpk Series A Firmware
Subscribe
1756-en2tpxt Series A
Subscribe
1756-en2tpxt Series A Firmware
Subscribe
1756-en2tr Series A
Subscribe
1756-en2tr Series A Firmware
Subscribe
1756-en2tr Series B
Subscribe
1756-en2tr Series B Firmware
Subscribe
1756-en2tr Series C
Subscribe
1756-en2tr Series C Firmware
Subscribe
1756-en2trk Series A
Subscribe
1756-en2trk Series A Firmware
Subscribe
1756-en2trk Series B
Subscribe
1756-en2trk Series B Firmware
Subscribe
1756-en2trk Series C
Subscribe
1756-en2trk Series C Firmware
Subscribe
1756-en2trxt Series A
Subscribe
1756-en2trxt Series A Firmware
Subscribe
1756-en2trxt Series B
Subscribe
1756-en2trxt Series B Firmware
Subscribe
1756-en2trxt Series C
Subscribe
1756-en2trxt Series C Firmware
Subscribe
1756-en2txt Series A
Subscribe
1756-en2txt Series A Firmware
Subscribe
1756-en2txt Series B
Subscribe
1756-en2txt Series B Firmware
Subscribe
1756-en2txt Series C
Subscribe
1756-en2txt Series C Firmware
Subscribe
1756-en2txt Series D
Subscribe
1756-en2txt Series D Firmware
Subscribe
1756-en3tr Series A
Subscribe
1756-en3tr Series A Firmware
Subscribe
1756-en3tr Series B
Subscribe
1756-en3tr Series B Firmware
Subscribe
1756-en3trk Series A
Subscribe
1756-en3trk Series A Firmware
Subscribe
1756-en3trk Series B
Subscribe
1756-en3trk Series B Firmware
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33768 | A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device. |
Solution
Update firmware. Update EN2* ControlLogix communications modules to mitigated firmware. * Restrict traffic to the SMTP port (25), if not needed. * Customers using the EN2/EN3 versions 10.x and higher can disable the email object, if not needed. Instructions can be found in the EtherNet/IP Network Devices User Manual (rockwellautomation.com) https://literature.rockwellautomation.com/idc/groups/literature/documents/um/enet-um006_-en-p.pdf , publication ENET-UM006. * QA43240 - Recommended Security Guidelines from Rockwell Automation https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012
Workaround
No workaround given by the vendor.
Wed, 25 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-09-25T15:44:30.367Z
Reserved: 2023-04-24T21:35:54.200Z
Link: CVE-2023-2262
Updated: 2024-08-02T06:19:14.686Z
Status : Modified
Published: 2023-09-20T16:15:12.257
Modified: 2024-11-21T07:58:15.763
Link: CVE-2023-2262
No data.
OpenCVE Enrichment
No data.
EUVD