Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
* Update firmware. Update EN2* ControlLogix communications modules to mitigated firmware. * Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks. * Implement detection signatures. Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.
Workaround
No workaround given by the vendor.
No history.

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-08-02T07:01:57.031Z
Reserved: 2023-07-10T15:34:52.031Z
Link: CVE-2023-3595

No data.

Status : Modified
Published: 2023-07-12T13:15:09.880
Modified: 2024-11-21T08:17:37.710
Link: CVE-2023-3595

No data.

No data.