Stack-based Buffer Overflow in RSLinx Classic by Rockwell Automation
CVE-2019-6553

9.8CRITICAL

Key Information:

Vendor
CVE Published:
4 April 2019

What is CVE-2019-6553?

An input validation flaw in a .dll file of RSLinx Classic allows attackers to exploit a stack-based buffer overflow by sending a malformed Forward Open service request. This vulnerability can potentially allow an unauthorized entity to execute arbitrary code, posing significant security risks to industrial control systems.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

RSLinx Classic 4.10.00 and prior

References

EPSS Score

17% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.