Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.
No analysis available yet.
Vendor Solution
* Update firmware. Update EN4* ControlLogix communications modules to firmware revision 5.002. * Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks. * Implement detection signatures. Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44246 | Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages. |
Thu, 07 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-11-07T16:59:33.267Z
Reserved: 2023-07-10T15:34:53.790Z
Link: CVE-2023-3596
Updated: 2024-08-02T07:01:56.685Z
Status : Modified
Published: 2023-07-12T13:15:09.947
Modified: 2024-11-21T08:17:37.873
Link: CVE-2023-3596
No data.
OpenCVE Enrichment
No data.
EUVD