Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-47244 | An input validation vulnerability exists in the Rockwell Automation 5015 - AENFTXT when a manipulated PTP packet is sent, causing the secondary adapter to result in a major nonrecoverable fault. If exploited, a power cycle is required to recover the product. |
Solution
Customers using the affected software are encouraged to apply the risk mitigations, if possible. * Update to the corrected firmware revision, v2.012. * For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight to minimize the risk of the vulnerability.
Workaround
No workaround given by the vendor.
Tue, 10 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation
Rockwellautomation 5015-aenftxt Rockwellautomation 5015-aenftxt Firmware |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:h:rockwellautomation:5015-aenftxt:-:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:5015-aenftxt_firmware:2.011:*:*:*:*:*:*:* |
|
Vendors & Products |
Rockwellautomation
Rockwellautomation 5015-aenftxt Rockwellautomation 5015-aenftxt Firmware |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-08-01T21:33:04.327Z
Reserved: 2024-06-17T18:12:51.583Z
Link: CVE-2024-6089

Updated: 2024-08-01T21:33:04.327Z

Status : Modified
Published: 2024-07-16T17:15:11.817
Modified: 2024-11-21T09:48:56.433
Link: CVE-2024-6089

No data.

No data.