Rockwellautomation

Softlogix

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 24.22%
  • Veröffentlicht 24.01.2013 21:55:01
  • Zuletzt bearbeitet 30.06.2025 22:15:27

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the CPU to stop logic execution and enter a fault state, a DoS can occur...

  • EPSS 26.69%
  • Veröffentlicht 24.01.2013 21:55:01
  • Zuletzt bearbeitet 30.06.2025 22:15:28

The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the CPU to crash. Succ...

  • EPSS 29.48%
  • Veröffentlicht 24.01.2013 21:55:01
  • Zuletzt bearbeitet 30.06.2025 22:15:28

The device does not properly authenticate users and the potential exists for a remote user to upload a new firmware image to the Ethernet card, whether it is a corrupt or legitimate firmware image. Successful exploitation of this vulnerability could ...

  • EPSS 28.23%
  • Veröffentlicht 24.01.2013 21:55:01
  • Zuletzt bearbeitet 30.06.2025 22:15:28

The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the NIC to crash. Succ...

  • EPSS 0.94%
  • Veröffentlicht 24.01.2013 21:55:01
  • Zuletzt bearbeitet 30.06.2025 22:15:29

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that changes the product’s configuration and network parameters, a DoS condition ca...

  • EPSS 1.17%
  • Veröffentlicht 24.01.2013 21:55:01
  • Zuletzt bearbeitet 30.06.2025 22:15:29

The Web server password authentication mechanism used by the products is vulnerable to a MitM and Replay attack. Successful exploitation of this vulnerability will allow unauthorized access of the product’s Web server to view and alter product config...

  • EPSS 2.8%
  • Veröffentlicht 24.01.2013 21:55:01
  • Zuletzt bearbeitet 30.06.2025 22:15:29

An information exposure of confidential information results when the device receives a specially crafted CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP. Successful exploitation of this vulnerability could cause loss of ...