Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-44246 Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.
Fixes

Solution

* Update firmware. Update EN4* ControlLogix communications modules to firmware revision 5.002.  * Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks. * Implement detection signatures. Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.


Workaround

No workaround given by the vendor.

History

Thu, 07 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-11-07T16:59:33.267Z

Reserved: 2023-07-10T15:34:53.790Z

Link: CVE-2023-3596

cve-icon Vulnrichment

Updated: 2024-08-02T07:01:56.685Z

cve-icon NVD

Status : Modified

Published: 2023-07-12T13:15:09.947

Modified: 2024-11-21T08:17:37.873

Link: CVE-2023-3596

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.