An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.
Metrics
Affected Vendors & Products
References
History
Thu, 03 Oct 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation
Rockwellautomation sequencemanager |
|
CPEs | cpe:2.3:a:rockwellautomation:sequencemanager:*:*:*:*:*:*:*:* | |
Vendors & Products |
Rockwellautomation
Rockwellautomation sequencemanager |
|
Metrics |
ssvc
|
Fri, 27 Sep 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted. | |
Title | Rockwell Automation Input Validation Vulnerability exists in the SequenceManager™ Server | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: Rockwell
Published: 2024-09-27T19:45:04.984Z
Updated: 2024-10-03T13:56:51.490Z
Reserved: 2024-07-01T21:06:42.745Z
Link: CVE-2024-6436
Vulnrichment
Updated: 2024-10-03T13:56:45.951Z
NVD
Status : Awaiting Analysis
Published: 2024-09-27T20:15:06.043
Modified: 2024-09-30T12:45:57.823
Link: CVE-2024-6436
Redhat
No data.