Remote Code Execution Vulnerability in RSLinx Classic by Rockwell Automation
CVE-2018-14829

9.8CRITICAL

Key Information:

Vendor
CVE Published:
20 September 2018

What is CVE-2018-14829?

The vulnerability in RSLinx Classic Versions 4.00.01 and earlier allows remote threat actors to exploit the application by sending malformed CIP packets to Port 44818. This could cause the application to crash and may also enable the execution of arbitrary code, posing significant risks to the integrity and availability of the system. Affected users should implement appropriate security measures to mitigate potential attacks.

Affected Version(s)

RSLinx Classic 4.00.01 and prior

References

EPSS Score

48% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.