Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44246 | Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages. |
Solution
* Update firmware. Update EN4* ControlLogix communications modules to firmware revision 5.002. * Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks. * Implement detection signatures. Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.
Workaround
No workaround given by the vendor.
Thu, 07 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-11-07T16:59:33.267Z
Reserved: 2023-07-10T15:34:53.790Z
Link: CVE-2023-3596
Updated: 2024-08-02T07:01:56.685Z
Status : Modified
Published: 2023-07-12T13:15:09.947
Modified: 2024-11-21T08:17:37.873
Link: CVE-2023-3596
No data.
OpenCVE Enrichment
No data.
EUVD