Vulnerability Description
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rockwellautomation | Rslinx | <= 4.00.01 |
Related Weaknesses (CWE)
References
- https://ics-cert.us-cert.gov/advisories/ICSA-18-263-02Third Party AdvisoryUS Government Resource
- https://www.tenable.com/security/research/tra-2018-26ExploitThird Party Advisory
- https://ics-cert.us-cert.gov/advisories/ICSA-18-263-02Third Party AdvisoryUS Government Resource
- https://www.tenable.com/security/research/tra-2018-26ExploitThird Party Advisory
FAQ
What is CVE-2018-14821?
CVE-2018-14821 is a vulnerability with a CVSS score of 7.5 (HIGH). Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing t...
How severe is CVE-2018-14821?
CVE-2018-14821 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-14821?
Check the references section above for vendor advisories and patch information. Affected products include: Rockwellautomation Rslinx.