Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

Advisories

No advisories yet.

Fixes

Solution

* Update firmware. Update EN2* ControlLogix communications modules to mitigated firmware. * Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks. * Implement detection signatures. Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-08-02T07:01:57.031Z

Reserved: 2023-07-10T15:34:52.031Z

Link: CVE-2023-3595

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-07-12T13:15:09.880

Modified: 2024-11-21T08:17:37.710

Link: CVE-2023-3595

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.