Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-44246 | Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages. |
Solution
* Update firmware. Update EN4* ControlLogix communications modules to firmware revision 5.002. * Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks. * Implement detection signatures. Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.
Workaround
No workaround given by the vendor.
Thu, 07 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-11-07T16:59:33.267Z
Reserved: 2023-07-10T15:34:53.790Z
Link: CVE-2023-3596

Updated: 2024-08-02T07:01:56.685Z

Status : Modified
Published: 2023-07-12T13:15:09.947
Modified: 2024-11-21T08:17:37.873
Link: CVE-2023-3596

No data.

No data.