We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-3493

Rockwell Automation ControlLogix and GaurdLogix Vulnerable to Major Nonrecoverable Fault Due to Invalid Header Value



AssignerRockwell
Reserved2024-04-08
Published2024-04-15
Updated2024-08-12

Description

A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices.



HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Product status

Default status
unaffected

v35.011
affected

Default status
unaffected

v35.011
affected

Default status
unaffected

v5.001
affected

Default status
unaffected

v5.001
affected

References

https://www.rockwellautomation.com/en-us/support/advisory.SD1666.html

cve.org CVE-2024-3493

nvd.nist.gov CVE-2024-3493

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-3493
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.