We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-3493

Rockwell Automation ControlLogix and GaurdLogix Vulnerable to Major Nonrecoverable Fault Due to Invalid Header Value



Description

A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices.

Reserved 2024-04-08 | Published 2024-04-15 | Updated 2024-08-12 | Assigner Rockwell


HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

v35.011
affected

Default status
unaffected

v35.011
affected

Default status
unaffected

v5.001
affected

Default status
unaffected

v5.001
affected

References

www.rockwellautomation.com/...s/support/advisory.SD1666.html

cve.org (CVE-2024-3493)

nvd.nist.gov (CVE-2024-3493)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-3493

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.