First published: Fri Aug 09 2013(Updated: )
Schweitzer Engineering Laboratories (SEL) SEL-2241, SEL-3505, and SEL-3530 RTAC master devices allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Selinc Sel-2241 RTAC Module Firmware | =r113-v0-z001001-d20110721 | |
Selinc Sel-2241 RTAC Module Firmware | =r123-v0-z002001-d20130117 | |
SEL-3505 Firmware | =r119-v0-z001001-d20120720 | |
SEL-3505 Firmware | =r123-v0-z002001-d20130117 | |
Selinc Sel-3530 Firmware | =r100_-v0-z001001-d20090915 | |
Selinc Sel-3530 Firmware | =r123-v0-z002001 | |
SEL-3530-4 | =r107-v0-z001001-d20100818 | |
SEL-3530-4 | =r123-v0-z002001-d20130117 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2792 has a severity rating that indicates it can cause a denial of service condition.
To fix CVE-2013-2792, update the firmware on the affected SEL devices to the latest version provided by the manufacturer.
CVE-2013-2792 affects multiple SEL devices including SEL-2241, SEL-3505, and SEL-3530 across specific firmware versions.
CVE-2013-2792 facilitates a denial of service attack through an infinite loop triggered by a crafted DNP3 TCP packet.
Yes, CVE-2013-2792 can be exploited remotely by attackers sending specially crafted packets to the vulnerable devices.