Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47244 | An input validation vulnerability exists in the Rockwell Automation 5015 - AENFTXT when a manipulated PTP packet is sent, causing the secondary adapter to result in a major nonrecoverable fault. If exploited, a power cycle is required to recover the product. |
Solution
Customers using the affected software are encouraged to apply the risk mitigations, if possible. * Update to the corrected firmware revision, v2.012. * For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight to minimize the risk of the vulnerability.
Workaround
No workaround given by the vendor.
Tue, 10 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rockwellautomation
Rockwellautomation 5015-aenftxt Rockwellautomation 5015-aenftxt Firmware |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:h:rockwellautomation:5015-aenftxt:-:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:5015-aenftxt_firmware:2.011:*:*:*:*:*:*:* |
|
| Vendors & Products |
Rockwellautomation
Rockwellautomation 5015-aenftxt Rockwellautomation 5015-aenftxt Firmware |
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-08-01T21:33:04.327Z
Reserved: 2024-06-17T18:12:51.583Z
Link: CVE-2024-6089
Updated: 2024-08-01T21:33:04.327Z
Status : Modified
Published: 2024-07-16T17:15:11.817
Modified: 2024-11-21T09:48:56.433
Link: CVE-2024-6089
No data.
OpenCVE Enrichment
No data.
EUVD