Vulnerability Description
Triangle Research International (aka Tri) Nano-10 PLC devices with firmware r81 and earlier do not properly handle large length values in MODBUS data, which allows remote attackers to cause a denial of service (transition to the interrupt state) via a crafted packet to TCP port 502.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Triplc | Nano-10 Plc Firmware | <= r81 |
| Triplc | Nano-10 Plc | - |
Related Weaknesses (CWE)
References
- http://blogs.ixiacom.com/ixia-blog/hack-scada-zero-day-vulnerability-discovery-o
- http://osvdb.org/ref/97/tri-nano10.txt
- http://www.osvdb.org/97728
- http://blogs.ixiacom.com/ixia-blog/hack-scada-zero-day-vulnerability-discovery-o
- http://osvdb.org/ref/97/tri-nano10.txt
- http://www.osvdb.org/97728
FAQ
What is CVE-2013-5741?
CVE-2013-5741 is a vulnerability with a CVSS score of 7.8 (HIGH). Triangle Research International (aka Tri) Nano-10 PLC devices with firmware r81 and earlier do not properly handle large length values in MODBUS data, which allows remote attackers to cause a denial o...
How severe is CVE-2013-5741?
CVE-2013-5741 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-5741?
Check the references section above for vendor advisories and patch information. Affected products include: Triplc Nano-10 Plc Firmware, Triplc Nano-10 Plc.