Rockwell Automation ControlLogix Communication Modules Vulnerable to Remote Code Execution
CVE-2023-3595
9.8CRITICAL
Key Information:
- Vendor
- Rockwell Automation
- Vendor
- CVE Published:
- 12 July 2023
Badges
๐ฐ Ransomware๐พ Exploit Exists๐ฐ News Worthy
Summary
A vulnerability exists in Rockwell Automation's ControlLogix communication products, specifically the 1756 EN2* and 1756 EN3* models. This flaw could be exploited by a malicious user to achieve remote code execution with persistence. Attackers can craft malicious CIP messages to manipulate, deny, or exfiltrate data traversing the affected device, thus compromising the integrity and confidentiality of the system.
Affected Version(s)
1756-EN2F Series A, B <=5.008 & 5.028
1756-EN2F Series C <=11.003
1756-EN2FK Series A, B <=5.008 & 5.028
Get notified when SecurityVulnerability.io launches alerting ๐
Well keep you posted ๐ง
News Articles
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- ๐ฐ
First article discovered by The Hacker News
- ๐ฐ
Used in Ransomware
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved