First published: Wed Aug 04 2010(Updated: )
The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockwell Automation 1756-ENBT series A with firmware 3.2.6 and 3.6.1 and other products, allows remote attackers to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185, a related issue to CVE-2005-3804.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation 1756-ENBT/A Firmware | =3.2.6 | |
Rockwell Automation 1756-ENBT/A Firmware | =3.6.1 | |
Wind River VxWorks | <=6.9.4.12 | |
RockwellAutomation 1756-ENBT | ||
All of | ||
Any of | ||
Rockwell Automation 1756-ENBT/A Firmware | =3.2.6 | |
Rockwell Automation 1756-ENBT/A Firmware | =3.6.1 | |
Wind River VxWorks | <=6.9.4.12 | |
RockwellAutomation 1756-ENBT |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2965 is considered a critical vulnerability due to the potential for remote memory access and task management.
To remediate CVE-2010-2965, update the firmware of the Rockwell Automation 1756-ENBT to a version that addresses this vulnerability.
CVE-2010-2965 affects Wind River VxWorks versions up to 6.9.4.12 and Rockwell Automation 1756-ENBT firmware versions 3.2.6 and 3.6.1.
Attackers exploiting CVE-2010-2965 can read or modify arbitrary memory locations, perform unauthorized function calls, or manage tasks.
If your system does not utilize the affected firmware versions for Rockwell Automation 1756-ENBT or Wind River VxWorks, it is not at risk from CVE-2010-2965.