A denial-of-service vulnerability exists in Rockwell Automation FactoryTalk Transaction Manager. This vulnerability can be exploited by sending a modified packet to port 400. If exploited, the application could potentially crash or experience a high CPU or memory usage condition, causing intermittent application functionality issues. The application would need to be restarted to recover from the DoS.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-34236 A denial-of-service vulnerability exists in Rockwell Automation FactoryTalk Transaction Manager. This vulnerability can be exploited by sending a modified packet to port 400. If exploited, the application could potentially crash or experience a high CPU or memory usage condition, causing intermittent application functionality issues. The application would need to be restarted to recover from the DoS.
Fixes

Solution

Customers using the affected software are encouraged to apply the risk mitigations below, if possible. Additionally, we encourage our customers to implement our suggested security best practices to minimize the risk of the vulnerability. * Customers should follow the instructions in BF29042 - Patch: Multiple issues, FactoryTalk Transaction Manager 13.00/13.10 https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138425  to install the patch to mitigate the issue.


Workaround

No workaround given by the vendor.

History

Wed, 05 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2025-03-05T18:57:49.583Z

Reserved: 2023-05-17T18:40:49.427Z

Link: CVE-2023-2778

cve-icon Vulnrichment

Updated: 2024-08-02T06:33:05.706Z

cve-icon NVD

Status : Modified

Published: 2023-06-13T21:15:10.103

Modified: 2024-11-21T07:59:16.390

Link: CVE-2023-2778

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.