We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-6436

Rockwell Automation Input Validation Vulnerability exists in the SequenceManager™ Server



Description

An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.

Reserved 2024-07-01 | Published 2024-09-27 | Updated 2024-10-03 | Assigner Rockwell


HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

<2.0
affected

References

www.rockwellautomation.com/...dvisories/advisory.SD1679.html

cve.org (CVE-2024-6436)

nvd.nist.gov (CVE-2024-6436)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-6436

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.