First published: Mon Sep 19 2016(Updated: )
Buffer overflow in Rockwell Automation RSLogix Micro Starter Lite, RSLogix Micro Developer, RSLogix 500 Starter Edition, RSLogix 500 Standard Edition, and RSLogix 500 Professional Edition allows remote attackers to execute arbitrary code via a crafted RSS project file.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
RSLogix 500 Professional Edition | ||
Rockwell Automation RSLogix 500 Standard Edition | ||
RSLogix 500 Starter Edition | ||
RSLogix Micro | ||
Rockwell Automation RSLogix Micro Starter Lite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5814 has a high severity rating due to the potential for remote code execution.
To fix CVE-2016-5814, update to the latest version of the affected software provided by Rockwell Automation.
CVE-2016-5814 affects RSLogix Micro Starter Lite, RSLogix Micro Developer, RSLogix 500 Starter Edition, RSLogix 500 Standard Edition, and RSLogix 500 Professional Edition.
Yes, CVE-2016-5814 can be exploited remotely through a crafted RSS project file.
CVE-2016-5814 is a buffer overflow vulnerability that allows attackers to execute arbitrary code.