Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47536 | An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted. |
Solution
* Corrected in versions v2.0 or later. * Users using the affected software who are not able to upgrade to one of the corrected versions are encouraged to apply security best practices, where possible. · Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Workaround
No workaround given by the vendor.
Wed, 22 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| Metrics |
cvssV3_1
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 03 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rockwellautomation
Rockwellautomation sequencemanager |
|
| CPEs | cpe:2.3:a:rockwellautomation:sequencemanager:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rockwellautomation
Rockwellautomation sequencemanager |
|
| Metrics |
ssvc
|
Fri, 27 Sep 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted. | |
| Title | Rockwell Automation Input Validation Vulnerability exists in the SequenceManager™ Server | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-10-03T13:56:51.490Z
Reserved: 2024-07-01T21:06:42.745Z
Link: CVE-2024-6436
Updated: 2024-10-03T13:56:45.951Z
Status : Analyzed
Published: 2024-09-27T20:15:06.043
Modified: 2025-10-22T20:29:10.850
Link: CVE-2024-6436
No data.
OpenCVE Enrichment
No data.
EUVD