5.3
CVE-2023-0027
- EPSS 0.05%
- Veröffentlicht 17.03.2023 17:15:11
- Zuletzt bearbeitet 21.11.2024 07:36:25
- Quelle PSIRT@rockwellautomation.com
- CVE-Watchlists
- Unerledigt
Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected device’s Modbus TCP Server AOI information.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rockwellautomation ≫ Modbus Tcp Server Add On Instructions Version >= 2.00.00 < 2.04.00
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.141 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
| PSIRT@rockwellautomation.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.