Remote Unauthenticated Access Vulnerability in RSLinx Classic by Rockwell Automation
CVE-2018-14821
7.5HIGH
What is CVE-2018-14821?
The RSLinx Classic application by Rockwell Automation is susceptible to a vulnerability that allows unauthenticated attackers to send malformed CIP packets to Port 44818. This can lead to the application terminating unexpectedly, resulting in service disruption. Users must manually restart the application to restore functionality, highlighting the importance of effective monitoring and prompt remediation of this issue to maintain operational continuity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
RSLinx Classic 4.00.01 and prior
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved