Lucene search

K
cve[email protected]CVE-2013-2805
HistoryMar 26, 2019 - 6:29 p.m.

CVE-2013-2805

2019-03-2618:29:00
CWE-125
web.nvd.nist.gov
26
cve-2013-2805
rockwell automation
rslinx enterprise
logreceiver.exe
cpr9
udp
security advisory
nvd

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.0%

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it receives a datagram with an incorrect value in the β€œRecord Data Size” field. By sending a datagram to the service over Port 4444/UDP with the β€œRecord Data Size” field modified to an oversized value, an attacker could cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to this vulnerability can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Affected configurations

NVD
Node
rockwellautomationrslinx_enterpriseMatch5.10.00
OR
rockwellautomationrslinx_enterpriseMatch5.10.01
OR
rockwellautomationrslinx_enterpriseMatch5.20.00
OR
rockwellautomationrslinx_enterpriseMatch5.21.00
OR
rockwellautomationrslinx_enterpriseMatch5.30.00
OR
rockwellautomationrslinx_enterpriseMatch5.40.00
OR
rockwellautomationrslinx_enterpriseMatch5.50.00
OR
rockwellautomationrslinx_enterpriseMatch5.51.00
OR
rockwellautomationrslinx_enterpriseMatch5.60.00

CNA Affected

[
  {
    "product": "RSLinx Enterprise Software",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "CPR9"
      },
      {
        "status": "affected",
        "version": "CPR9-SR1"
      },
      {
        "status": "affected",
        "version": "CPR9-SR2"
      },
      {
        "status": "affected",
        "version": "CPR9-SR3"
      },
      {
        "status": "affected",
        "version": "CPR9-SR4"
      },
      {
        "status": "affected",
        "version": "CPR9-SR5"
      },
      {
        "status": "affected",
        "version": "CPR9-SR5.1"
      },
      {
        "status": "affected",
        "version": "CPR9-SR6"
      }
    ]
  }
]

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.0%

Related for CVE-2013-2805