First published: Mon Dec 08 2014(Updated: )
Emerson Process Management ROC800 RTU with software 3.50 and earlier, DL8000 RTU with software 2.30 and earlier, and ROC800L RTU with software 1.20 and earlier allows remote attackers to execute arbitrary commands via a TCP replay attack.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Emerson DL 8000 Remote Terminal Unit Firmware | =2.30 | |
Emerson DL 8000 Remote Terminal Unit Firmware | ||
Emerson Roc800l Firmware | <=1.20 | |
Emerson Roc800l | ||
Emerson Roc800l Firmware | <=3.50 | |
Emerson Roc 800l Remote Terminal Unit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2810 is considered to have a high severity level due to its potential for remote command execution by attackers.
To mitigate CVE-2013-2810, upgrade the affected Emerson devices to the latest firmware versions beyond the impacted versions.
CVE-2013-2810 affects Emerson Process Management ROC800 RTUs with software 3.50 and earlier, DL8000 RTUs with software 2.30 and earlier, and ROC800L RTUs with software 1.20 and earlier.
Yes, CVE-2013-2810 can be exploited remotely through a TCP replay attack that allows execution of arbitrary commands.
Exploitation of CVE-2013-2810 can lead to unauthorized access and control over the affected Emerson remote terminal units, potentially compromising system integrity.