Rockwell Automation CompactLogix 5370 Uncontrolled Resource Consumption
CVE-2019-10952
9.8CRITICAL
Key Information:
- Vendor
- Rockwell Automation
- Status
- Vendor
- CVE Published:
- 1 May 2019
Summary
An attacker could send a crafted HTTP/HTTPS request to render the web server unavailable and/or lead to remote code execution caused by a stack-based buffer overflow vulnerability. A cold restart is required for recovering
CompactLogix 5370 L1, L2, and L3 Controllers, Compact GuardLogix 5370 controllers, and Armor Compact GuardLogix 5370 Controllers Versions 20 - 30 and earlier.
Affected Version(s)
Armor Compact GuardLogix 5370 controllers 0 < 20 - 30
Compact GuardLogix 5370 controllers 0 < 20 - 30
CompactLogix 5370 L1 controllers 0 < 20 - 30
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Younes Dragoni of Nozomi Networks of CyberX reported to CISA.