Description

Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.

Published: 2023-07-12
Score: 7.5 High
EPSS: 2.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

* Update firmware. Update EN4* ControlLogix communications modules to firmware revision 5.002.  * Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks. * Implement detection signatures. Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-44246 Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.
History

Thu, 07 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Rockwellautomation 1756-en4tr 1756-en4tr Firmware 1756-en4trk 1756-en4trk Firmware 1756-en4trxt 1756-en4trxt Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-11-07T16:59:33.267Z

Reserved: 2023-07-10T15:34:53.790Z

Link: CVE-2023-3596

cve-icon Vulnrichment

Updated: 2024-08-02T07:01:56.685Z

cve-icon NVD

Status : Modified

Published: 2023-07-12T13:15:09.947

Modified: 2024-11-21T08:17:37.873

Link: CVE-2023-3596

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses