First published: Thu Oct 03 2013(Updated: )
The kernel in ENEA OSE on the Emerson Process Management ROC800 RTU with software 3.50 and earlier, DL8000 RTU with software 2.30 and earlier, and ROC800L RTU with software 1.20 and earlier performs network-beacon broadcasts, which allows remote attackers to obtain potentially sensitive information about device presence by listening for broadcast traffic.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
ENEA OSE | <=1.20 | |
Emerson Roc800l | ||
ENEA OSE | <=2.30 | |
Emerson DL 8000 Remote Terminal Unit Firmware | ||
ENEA OSE | <=3.50 | |
Emerson Roc 800l Remote Terminal Unit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0693 is considered a high-severity vulnerability due to the risk of sensitive information exposure.
To fix CVE-2013-0693, upgrade the affected ENEA OSE and Emerson RTU devices to the latest software version.
CVE-2013-0693 affects ENEA OSE on various Emerson Process Management RTUs including ROC800, DL8000, and ROC800L with specified software versions.
CVE-2013-0693 may allow remote attackers to obtain potentially sensitive information via network-beacon broadcasts.
Yes, CVE-2013-0693 has a public advisory issued by ICS-CERT detailing the vulnerability and recommended actions.