Vulnerabilites related to rockwellautomation - 1756-en3tr_series_b
Vulnerability from fkie_nvd
Published
2018-12-07 14:29
Modified
2024-11-21 03:55
Summary
Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:micrologix_1400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11507EFF-5C53-4217-9257-21936118C032",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "196EA0BE-FDF3-46BE-B3DA-5F49208C5D80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-enbt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "321698DF-C035-45A7-84A7-503C9162330F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-enbt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "330E9A05-C869-41B1-BB28-FD2A7C7ED0CE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-eweb_series_a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8B22952-CE7C-4324-BF4D-61131FE4B253",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-eweb_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "045500B9-F371-4D33-9621-3E978606752D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-eweb_series_b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5153E2F2-FC41-4BF0-B625-EA50C55A5329",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-eweb_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4C4FF18-B699-4313-B504-F9C75816B512",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2f_series_a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D4B3185-B776-46C4-B47F-CE48861A422B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2f_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AC710F-97B3-47A1-86EC-3148A21F16B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2f_series_b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7242493E-0B2A-4AF3-BF44-15D3D1DB0021",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2f_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA49358A-F76E-4DEC-994C-B988DE38BF7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2f_series_c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42555C87-3D2A-460F-85A4-626410C56731",
              "versionEndIncluding": "10.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2f_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E5B08F-BD0C-4B3F-9897-61C945981CC6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8E9CEA5-F039-484D-A234-1E3ADA352E32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB6A3C1-6419-4CDB-B7F5-57F20DA43C5A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADCF431D-0F13-4037-BBDF-4199B5860CCA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E9D2541-B0DB-4925-ACD6-FCC2A028FA4A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B8DEC1-3980-49E0-82B1-275FD7870EC9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13581B79-89FF-42F0-93C1-CB77582E7303",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BC034DA-D8ED-43CA-9D7B-2592B58BC0F4",
              "versionEndIncluding": "10.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F71090C1-36AD-4A1B-92B5-CB391593DF4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94271569-D658-4F95-B9A6-2C1DB2647EB2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A8E21A-3826-497C-9F3D-6D9091AD7647",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAEF2D94-6224-4877-9169-E5B0DB3FAA25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8607CD0D-0EE7-41CF-8E00-C0F5C83646A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99562089-73F5-4AF9-BEE6-E7B977678AAD",
              "versionEndIncluding": "10.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D58BA41B-3859-4489-9C74-730C27B1EFF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en3tr_series_a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE90B141-E680-4D15-8BCE-8D58909A3679",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en3tr_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4824C266-82B1-4B74-AF72-BFCEF0547023",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en3tr_series_b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3493D13F-CC5F-470D-ADFE-79C2C90665D6",
              "versionEndIncluding": "10.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en3tr_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14CF3A11-7130-420A-B99E-8FADA7C23484",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address."
    },
    {
      "lang": "es",
      "value": "Rockwell Automation MicroLogix 1400 Controllers y 1756 ControlLogix Communications Modules. Un actor de amenaza remoto no autenticado podr\u00eda enviar una petici\u00f3n de conexi\u00f3n CIP a un dispositivo afectado y, tras conectarse exitosamente, enviar una nueva configuraci\u00f3n IP al dispositivo afectado incluso aunque el controlador en el sistema est\u00e9 configurado en modo Hard RUN. Cuando el dispositivo afectado acepta esta nueva configuraci\u00f3n IP, ocurre una p\u00e9rdida de comunicaci\u00f3n entre el dispositivo y el resto del sistema, ya que el tr\u00e1fico del sistema sigue intentando comunicarse con el dispositivo mediante la direcci\u00f3n IP sobrescrita."
    }
  ],
  "id": "CVE-2018-17924",
  "lastModified": "2024-11-21T03:55:13.093",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-12-07T14:29:00.663",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106132"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-310-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106132"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-310-02"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-20 16:15
Modified
2024-11-21 07:58
Summary
A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.
Impacted products
Vendor Product Version
rockwellautomation 1756-en2t_series_a_firmware *
rockwellautomation 1756-en2t_series_a -
rockwellautomation 1756-en2t_series_b_firmware *
rockwellautomation 1756-en2t_series_b -
rockwellautomation 1756-en2t_series_c_firmware *
rockwellautomation 1756-en2t_series_c -
rockwellautomation 1756-en2t_series_d_firmware *
rockwellautomation 1756-en2t_series_d -
rockwellautomation 1756-en2tk_series_a_firmware *
rockwellautomation 1756-en2tk_series_a -
rockwellautomation 1756-en2tk_series_b_firmware *
rockwellautomation 1756-en2tk_series_b -
rockwellautomation 1756-en2tk_series_c_firmware *
rockwellautomation 1756-en2tk_series_c -
rockwellautomation 1756-en2txt_series_a_firmware *
rockwellautomation 1756-en2txt_series_a -
rockwellautomation 1756-en2txt_series_b_firmware *
rockwellautomation 1756-en2txt_series_b -
rockwellautomation 1756-en2txt_series_c_firmware *
rockwellautomation 1756-en2txt_series_c -
rockwellautomation 1756-en2txt_series_d_firmware *
rockwellautomation 1756-en2txt_series_d -
rockwellautomation 1756-en2tp_series_a_firmware *
rockwellautomation 1756-en2tp_series_a -
rockwellautomation 1756-en2tpk_series_a_firmware *
rockwellautomation 1756-en2tpk_series_a -
rockwellautomation 1756-en2tr_series_a_firmware *
rockwellautomation 1756-en2tr_series_a -
rockwellautomation 1756-en2tr_series_b_firmware *
rockwellautomation 1756-en2tr_series_b -
rockwellautomation 1756-en2tr_series_c_firmware *
rockwellautomation 1756-en2tr_series_c -
rockwellautomation 1756-en2trk_series_a_firmware *
rockwellautomation 1756-en2trk_series_a -
rockwellautomation 1756-en2trk_series_b_firmware *
rockwellautomation 1756-en2trk_series_b -
rockwellautomation 1756-en2trk_series_c_firmware *
rockwellautomation 1756-en2trk_series_c -
rockwellautomation 1756-en2trxt_series_a_firmware *
rockwellautomation 1756-en2trxt_series_a -
rockwellautomation 1756-en2trxt_series_b_firmware *
rockwellautomation 1756-en2trxt_series_b -
rockwellautomation 1756-en2trxt_series_c_firmware *
rockwellautomation 1756-en2trxt_series_c -
rockwellautomation 1756-en2f_series_a_firmware *
rockwellautomation 1756-en2f_series_a -
rockwellautomation 1756-en2f_series_b_firmware *
rockwellautomation 1756-en2f_series_b -
rockwellautomation 1756-en2f_series_c_firmware *
rockwellautomation 1756-en2f_series_c -
rockwellautomation 1756-en2fk_series_a_firmware *
rockwellautomation 1756-en2fk_series_a -
rockwellautomation 1756-en2fk_series_b_firmware *
rockwellautomation 1756-en2fk_series_b -
rockwellautomation 1756-en2fk_series_c_firmware *
rockwellautomation 1756-en2fk_series_c -
rockwellautomation 1756-en3tr_series_a_firmware *
rockwellautomation 1756-en3tr_series_a -
rockwellautomation 1756-en3tr_series_b_firmware *
rockwellautomation 1756-en3tr_series_b -
rockwellautomation 1756-en3trk_series_a_firmware *
rockwellautomation 1756-en3trk_series_a -
rockwellautomation 1756-en3trk_series_b_firmware *
rockwellautomation 1756-en3trk_series_b -
rockwellautomation 1756-en2tpxt_series_a_firmware *
rockwellautomation 1756-en2tpxt_series_a -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DBA36D-99FB-4A94-9141-EBFF99D1E574",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB6A3C1-6419-4CDB-B7F5-57F20DA43C5A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32C3D42D-B4C8-411F-A18D-5390A9D73A7D",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E9D2541-B0DB-4925-ACD6-FCC2A028FA4A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E02DF41-BD77-4058-BC32-CF60E464A236",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13581B79-89FF-42F0-93C1-CB77582E7303",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53C2B946-EE0C-4074-832E-3B6803EBBF50",
              "versionEndIncluding": "11.002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F71090C1-36AD-4A1B-92B5-CB391593DF4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tk_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05DDAA44-9D89-4625-83CE-60E4342D49C5",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tk_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D480985-3B35-4A8A-A34D-102D7158CC82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tk_series_b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3751BAE8-EE9F-4BCB-B5D5-72F41A5F1F9A",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tk_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "325A07AC-6968-4735-822B-41FD1825BB2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tk_series_c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "508777D7-8F16-4CE0-AAB6-CB27C4B8ED3F",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tk_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEEC7331-AFCF-4636-BCA4-DA112B347EC1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2txt_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B444F7C2-16D8-4DC9-8199-04924E1E7B92",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2txt_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC3AEB33-A244-450E-B17B-FAE7AF34961B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2txt_series_b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEF0E489-BC63-41AB-BDC5-6BFAFD2494E8",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2txt_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BC83C6-6158-4579-90BA-2BD28A7E1170",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2txt_series_c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "95118309-A0B0-467A-B347-26F9F79A0839",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2txt_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D40957C-6FC4-47DB-95D7-605402131B69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2txt_series_d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE24707E-803D-473C-A106-F3ADBC1E9C5A",
              "versionEndIncluding": "11.002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2txt_series_d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37026F7B-79F3-4979-A110-92F851DCA216",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tp_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FE7C9F-A1F8-46F0-B20E-FD1552D900D1",
              "versionEndIncluding": "11.002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tp_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE460FB3-5810-46C2-B3AC-F858B472BF1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tpk_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0302BF7-FBB1-49DC-A194-D137C4D8BBA9",
              "versionEndIncluding": "11.002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tpk_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BF8A626-59FF-4C66-9EE4-EB0D482B3820",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFB1559A-5FBE-4C4E-80F6-8C813A7976DE",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A8E21A-3826-497C-9F3D-6D9091AD7647",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "131008C1-59BF-4ADE-A1CE-C9058F9100AD",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8607CD0D-0EE7-41CF-8E00-C0F5C83646A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A67C49B-19D2-473B-B9AD-27AC74AE5C7F",
              "versionEndIncluding": "11.002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D58BA41B-3859-4489-9C74-730C27B1EFF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2trk_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80FC9CC-8B5C-418E-8FB3-B3C706293FA5",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2trk_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F91938-5D18-4E16-AA0F-F4DF00687D00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2trk_series_b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26482AD1-303B-4307-995E-6D95DA4FDAC8",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2trk_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73727644-A065-4B66-B61D-6C088D602FB4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2trk_series_c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C2A0650-380A-46C5-BC68-E648DACB1868",
              "versionEndIncluding": "11.002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2trk_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25989A49-1E62-42CC-9D24-0F4D207B4E1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2trxt_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7F5983-9E14-4324-88F3-30CAFB8A8EE7",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2trxt_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D063D86-05AF-4420-AB45-72B367166620",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2trxt_series_b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16EA785E-9F3A-4E43-B7E1-94C4512F742A",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2trxt_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C03E47-C8C1-489F-8ADB-C6329DA30054",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2trxt_series_c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEF6A316-666D-43DE-8E73-50ADC25B336B",
              "versionEndIncluding": "11.002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2trxt_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B1E8C2-F8CD-47BA-9707-68899F574AD3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2f_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83A96B74-2AB7-4476-8709-F22882456E3F",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2f_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AC710F-97B3-47A1-86EC-3148A21F16B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2f_series_b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83636475-1F9E-4ECE-89AE-0345CAA6F7C9",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2f_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA49358A-F76E-4DEC-994C-B988DE38BF7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2f_series_c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62832BDF-688B-4971-8B3C-3D0E0276CE42",
              "versionEndIncluding": "11.002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2f_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E5B08F-BD0C-4B3F-9897-61C945981CC6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2fk_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289F93E6-788E-4621-94C1-5AD3DE56A77D",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2fk_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53749A0B-6308-42F2-A778-9CA5BF21C37F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2fk_series_b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "233B8526-AD4B-4991-B5BE-3267867F593A",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2fk_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "017D3B94-CAA5-4C95-84EA-E838C67612BB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2fk_series_c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "700D2CD0-9CF9-419E-8F9B-6430C7791EF3",
              "versionEndIncluding": "11.002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2fk_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99CAC24D-C56D-40A6-9359-404666B8BADB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en3tr_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C6170-07F0-4FE9-B215-F0233CED1639",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en3tr_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4824C266-82B1-4B74-AF72-BFCEF0547023",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en3tr_series_b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60BA33FE-B54E-41EC-A76A-2303005165A3",
              "versionEndIncluding": "11.003",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en3tr_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14CF3A11-7130-420A-B99E-8FADA7C23484",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en3trk_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE75A9F-343E-4620-B20E-04F27D94E522",
              "versionEndIncluding": "5.028",
              "versionStartIncluding": "5.008",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en3trk_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0DD4F4F-B818-4A28-80DA-39C567776EA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en3trk_series_b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05E51589-EF0A-46E5-8DD9-4791BB562FD1",
              "versionEndIncluding": "11.002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en3trk_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "585547DE-D77F-43BC-BEE1-F17F1F2DD413",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tpxt_series_a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7311B9BB-46B5-4870-A6A0-1516B10F78B2",
              "versionEndIncluding": "11.002",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tpxt_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E85798C-F5A5-4AF6-881A-27D5C66395E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\n\n\nA buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.\n\n\n\n"
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de Desbordamiento del B\u00fafer en determinados dispositivos de comunicaci\u00f3n 1756-EN* de Rockwell Automation. Si se explota, un actor de amenazas podr\u00eda aprovechar esta vulnerabilidad para realizar una ejecuci\u00f3n remota de c\u00f3digo. Para aprovechar esta vulnerabilidad, un actor de amenazas tendr\u00eda que enviar una solicitud CIP manipulada con fines maliciosos al dispositivo."
    }
  ],
  "id": "CVE-2023-2262",
  "lastModified": "2024-11-21T07:58:15.763",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "PSIRT@rockwellautomation.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-20T16:15:12.257",
  "references": [
    {
      "source": "PSIRT@rockwellautomation.com",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140786"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140786"
    }
  ],
  "sourceIdentifier": "PSIRT@rockwellautomation.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-121"
        }
      ],
      "source": "PSIRT@rockwellautomation.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-12 13:15
Modified
2024-11-21 08:17
Summary
Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2f_series_a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D4B3185-B776-46C4-B47F-CE48861A422B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2f_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AC710F-97B3-47A1-86EC-3148A21F16B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2f_series_b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7242493E-0B2A-4AF3-BF44-15D3D1DB0021",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2f_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA49358A-F76E-4DEC-994C-B988DE38BF7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2f_series_c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F83304-EF89-48A4-AA0E-EBD5AE5E46E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2f_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E5B08F-BD0C-4B3F-9897-61C945981CC6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8E9CEA5-F039-484D-A234-1E3ADA352E32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB6A3C1-6419-4CDB-B7F5-57F20DA43C5A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADCF431D-0F13-4037-BBDF-4199B5860CCA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E9D2541-B0DB-4925-ACD6-FCC2A028FA4A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B8DEC1-3980-49E0-82B1-275FD7870EC9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13581B79-89FF-42F0-93C1-CB77582E7303",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2t_series_d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F147B7-96D5-4C52-AE8C-C5A24A103290",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2t_series_d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F71090C1-36AD-4A1B-92B5-CB391593DF4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94271569-D658-4F95-B9A6-2C1DB2647EB2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A8E21A-3826-497C-9F3D-6D9091AD7647",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAEF2D94-6224-4877-9169-E5B0DB3FAA25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8607CD0D-0EE7-41CF-8E00-C0F5C83646A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en2tr_series_c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB58AD4-EA1F-4106-ADD1-52EF2592B92C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en2tr_series_c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D58BA41B-3859-4489-9C74-730C27B1EFF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en3tr_series_a_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE90B141-E680-4D15-8BCE-8D58909A3679",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en3tr_series_a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4824C266-82B1-4B74-AF72-BFCEF0547023",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:rockwellautomation:1756-en3tr_series_b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01816E19-DF07-4A48-BC59-4A9918AE94FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:rockwellautomation:1756-en3tr_series_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14CF3A11-7130-420A-B99E-8FADA7C23484",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\nWhere this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.\n\n"
    }
  ],
  "id": "CVE-2023-3595",
  "lastModified": "2024-11-21T08:17:37.710",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "PSIRT@rockwellautomation.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-12T13:15:09.880",
  "references": [
    {
      "source": "PSIRT@rockwellautomation.com",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010"
    }
  ],
  "sourceIdentifier": "PSIRT@rockwellautomation.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "PSIRT@rockwellautomation.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2023-2262 (GCVE-0-2023-2262)
Vulnerability from cvelistv5
Published
2023-09-20 15:20
Modified
2024-09-25 15:44
Severity ?
CWE
  • CWE-121 - Stack-based Buffer Overflow
Summary
A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.
Impacted products
Vendor Product Version
Rockwell Automation 1756-EN2T Series A, B, C Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2T Series D Version: <=11.002
Create a notification for this product.
   Rockwell Automation 1756-EN2TK Series A, B, C Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2TXT Series A, B, C Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2TXT Series D Version: <=11.002
Create a notification for this product.
   Rockwell Automation 1756-EN2TP Series A Version: <=11.002
Create a notification for this product.
   Rockwell Automation 1756-EN2TPK Series A Version: <=11.002
Create a notification for this product.
   Rockwell Auotmation 1756-EN2TPXT Series A Version: <=11.002
Create a notification for this product.
   Rockwell Automation 1756-EN2TR Series A, B Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2TR Series C Version: <=11.002
Create a notification for this product.
   Rockwell Automation 1756-EN2TRK Series A, B Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2TRK Series C Version: <=11.002
Create a notification for this product.
   Rockwell Automation 1756-EN2TRXT Series A, B Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2TRXT Series C Version: <=11.002
Create a notification for this product.
   Rockwell Automation 1756-EN2F Series A, B Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2F Series C Version: <=11.002
Create a notification for this product.
   Rockwell Automation 1756-EN2FK Series A, B Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2FK Series C Version: <=11.002
Create a notification for this product.
   Rockwell Automation 1756-EN3TR Series A Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN3TR Series B Version: <=11.003
Create a notification for this product.
   Rockwell Automation 1756-EN3TRK Series A Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN3TRK Series B Version: <=11.002
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:19:14.686Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140786"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:rockwellautomation:1756-en2t_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2t_series_b_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2t_series_c_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2t_series_d_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2tk_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2tk_series_b_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2tk_series_c_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2txt_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2txt_series_b_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2txt_series_c_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2txt_series_d_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2tp_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2tpk_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2tr_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2tr_series_b_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2tr_series_c_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2trk_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2trk_series_b_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2trk_series_c_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2trxt_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2trxt_series_b_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2trxt_series_c_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2f_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2f_series_b_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2f_series_c_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2fk_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2fk_series_b_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2fk_series_c_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en3tr_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en3tr_series_b_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en3trk_series_a_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en3trk_series_b_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:rockwellautomation:1756-en2tpxt_series_a_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "1756-en2fk_series_c_firmware",
            "vendor": "rockwellautomation",
            "versions": [
              {
                "lessThanOrEqual": "5.028",
                "status": "affected",
                "version": "5.008",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "11.0002",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-2262",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-25T14:39:20.985093Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-25T15:44:30.367Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2T Series A, B, C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2T Series D",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TK Series A, B, C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TXT Series A, B, C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TXT Series D",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TP Series A",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TPK Series A",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TPXT Series A",
          "vendor": "Rockwell Auotmation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TR Series A, B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TR Series C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TRK Series A, B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TRK Series C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TRXT Series A, B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TRXT Series C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2F Series A, B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2F Series C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2FK Series A, B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2FK Series C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.002"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN3TR Series A",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN3TR Series B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN3TRK Series A",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN3TRK Series B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.002"
            }
          ]
        }
      ],
      "datePublic": "2023-09-12T12:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.\u003c/span\u003e\n\n\u003c/span\u003e\n\n"
            }
          ],
          "value": "\n\n\nA buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.\n\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121 Stack-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-20T15:47:00.968Z",
        "orgId": "b73dd486-f505-4403-b634-40b078b177f0",
        "shortName": "Rockwell"
      },
      "references": [
        {
          "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140786"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cstrong\u003eUpdate firmware.\u003c/strong\u003e\u0026nbsp;Update EN2* ControlLogix communications modules to mitigated firmware.\u003cbr\u003e\u003cul\u003e\u003cli\u003eRestrict traffic to the SMTP port (25), if not needed.\u003c/li\u003e\u003cli\u003eCustomers using the EN2/EN3 versions 10.x and higher can disable the email object, if not needed. Instructions can be found in the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://literature.rockwellautomation.com/idc/groups/literature/documents/um/enet-um006_-en-p.pdf\"\u003eEtherNet/IP Network Devices User Manual (rockwellautomation.com)\u003c/a\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e, publication ENET-UM006.\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012\"\u003eQA43240 - Recommended Security Guidelines from Rockwell Automation\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\n\n"
            }
          ],
          "value": "Update firmware.\u00a0Update EN2* ControlLogix communications modules to mitigated firmware.\n  *  Restrict traffic to the SMTP port (25), if not needed.\n  *  Customers using the EN2/EN3 versions 10.x and higher can disable the email object, if not needed. Instructions can be found in the  EtherNet/IP Network Devices User Manual (rockwellautomation.com) https://literature.rockwellautomation.com/idc/groups/literature/documents/um/enet-um006_-en-p.pdf , publication ENET-UM006.\n  *   QA43240 - Recommended Security Guidelines from Rockwell Automation https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012 \n\n\n\n\n"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Rockwell Automation Select Logix Communication Modules Vulnerable to Email Object Buffer Overflow",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0",
    "assignerShortName": "Rockwell",
    "cveId": "CVE-2023-2262",
    "datePublished": "2023-09-20T15:20:23.700Z",
    "dateReserved": "2023-04-24T21:35:54.200Z",
    "dateUpdated": "2024-09-25T15:44:30.367Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-3595 (GCVE-0-2023-3595)
Vulnerability from cvelistv5
Published
2023-07-12 12:37
Modified
2024-08-02 07:01
Severity ?
CWE
Summary
Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.
Impacted products
Vendor Product Version
Rockwell Automation 1756-EN2T Series A, B, C Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2T Series D Version: <=11.003
Create a notification for this product.
   Rockwell Automation 1756-EN2TK Series A, B, C Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2TXT Series A, B, C Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2TXT Series D Version: <=11.003
Create a notification for this product.
   Rockwell Automation 1756-EN2TP Series A Version: <=11.003
Create a notification for this product.
   Rockwell Automation 1756-EN2TPK Series A Version: <=11.003
Create a notification for this product.
   Rockwell Auotmation 1756-EN2TPXT Series A Version: <=11.003
Create a notification for this product.
   Rockwell Automation 1756-EN2TR Series A, B Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2TR Series C Version: <=11.003
Create a notification for this product.
   Rockwell Automation 1756-EN2TRK Series A, B Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2TRK Series C Version: <=11.003
Create a notification for this product.
   Rockwell Automation 1756-EN2TRXT Series A, B Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2TRXT Series C Version: <=11.003
Create a notification for this product.
   Rockwell Automation 1756-EN2F Series A, B Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2F Series C Version: <=11.003
Create a notification for this product.
   Rockwell Automation 1756-EN2FK Series A, B Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN2FK Series C Version: <=11.003
Create a notification for this product.
   Rockwell Automation 1756-EN3TR Series A Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN3TR Series B Version: <=11.003
Create a notification for this product.
   Rockwell Automation 1756-EN3TRK Series A Version: <=5.008 & 5.028
Create a notification for this product.
   Rockwell Automation 1756-EN3TRK Series B Version: <=11.003
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:01:57.031Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2T Series A, B, C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2T Series D",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TK Series A, B, C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TXT Series A, B, C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TXT Series D",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TP Series A",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TPK Series A",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TPXT Series A",
          "vendor": "Rockwell Auotmation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TR Series A, B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TR Series C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TRK Series A, B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TRK Series C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TRXT Series A, B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2TRXT Series C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2F Series A, B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2F Series C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2FK Series A, B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN2FK Series C",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN3TR Series A",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN3TR Series B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN3TRK Series A",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=5.008 \u0026 5.028"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "1756-EN3TRK Series B",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c=11.003"
            }
          ]
        }
      ],
      "datePublic": "2023-07-12T12:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eWhere this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.\u003c/span\u003e\n\n"
            }
          ],
          "value": "\nWhere this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-12T13:15:20.247Z",
        "orgId": "b73dd486-f505-4403-b634-40b078b177f0",
        "shortName": "Rockwell"
      },
      "references": [
        {
          "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cul\u003e\u003cli\u003e\u003cstrong\u003eUpdate firmware.\u003c/strong\u003e\u0026nbsp;Update EN2* ControlLogix communications modules to mitigated firmware.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eProperly segment networks.\u003c/strong\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks.\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eImplement detection signatures.\u003c/strong\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\n\n"
            }
          ],
          "value": "\n  *  Update firmware.\u00a0Update EN2* ControlLogix communications modules to mitigated firmware.\n  *  Properly segment networks.\u00a0Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks.\n  *  Implement detection signatures.\u00a0Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.\n\n\n\n\n"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Rockwell Automation ControlLogix Communication Modules Vulnerable to Remote Code Execution",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0",
    "assignerShortName": "Rockwell",
    "cveId": "CVE-2023-3595",
    "datePublished": "2023-07-12T12:37:01.939Z",
    "dateReserved": "2023-07-10T15:34:52.031Z",
    "dateUpdated": "2024-08-02T07:01:57.031Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-17924 (GCVE-0-2018-17924)
Vulnerability from cvelistv5
Published
2018-12-07 14:00
Modified
2024-08-05 11:01
Severity ?
CWE
  • CWE-306 - MISSING AUTHENTICATION FOR CRITICAL FUNCTION
Summary
Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.
References
Impacted products
Vendor Product Version
n/a Rockwell Automation Version: MicroLogix 1400 Controllers Series A, all versions, Series B, v21.003 and earlier,Series C, v21.003 and earlier, 1756 ControlLogix EtherNet/IP Communications Modules 1756-ENBT, all versions, 1756-EWEB Series A, all versions Series B, all versions, 1756-EN2F Series A, all versions, Series B, all versions, Series C, v10.10 and earlier, 1756-EN2T, Series A, all versions, Series B, all versions, Series C, all versions, Series D, v10.10 and earlier, 1756-EN2TR, Series A, all versions, Series B, all versions, Series C, v10.10 and earlier, 1756-EN3TR, Series A, all versions, Series B, v10.10 and earlier.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:01:14.626Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "106132",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106132"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-310-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Rockwell Automation",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "MicroLogix 1400 Controllers Series A, all versions, Series B, v21.003 and earlier,Series C, v21.003 and earlier, 1756 ControlLogix EtherNet/IP Communications Modules 1756-ENBT, all versions, 1756-EWEB Series A, all versions Series B, all versions, 1756-EN2F Series A, all versions, Series B, all versions, Series C, v10.10 and earlier, 1756-EN2T, Series A, all versions, Series B, all versions, Series C, all versions, Series D, v10.10 and earlier, 1756-EN2TR, Series A, all versions, Series B, all versions, Series C, v10.10 and earlier, 1756-EN3TR, Series A, all versions, Series B, v10.10 and earlier."
            }
          ]
        }
      ],
      "datePublic": "2018-12-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-08T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "106132",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106132"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-310-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2018-17924",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Rockwell Automation",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "MicroLogix 1400 Controllers Series A, all versions, Series B, v21.003 and earlier,Series C, v21.003 and earlier, 1756 ControlLogix EtherNet/IP Communications Modules 1756-ENBT, all versions, 1756-EWEB Series A, all versions Series B, all versions, 1756-EN2F Series A, all versions, Series B, all versions, Series C, v10.10 and earlier, 1756-EN2T, Series A, all versions, Series B, all versions, Series C, all versions, Series D, v10.10 and earlier, 1756-EN2TR, Series A, all versions, Series B, all versions, Series C, v10.10 and earlier, 1756-EN3TR, Series A, all versions, Series B, v10.10 and earlier."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "106132",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106132"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-310-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-310-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-17924",
    "datePublished": "2018-12-07T14:00:00",
    "dateReserved": "2018-10-02T00:00:00",
    "dateUpdated": "2024-08-05T11:01:14.626Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}