First published: Thu Sep 20 2018(Updated: )
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Rslinx | <=4.00.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2018-14821.
The severity level of CVE-2018-14821 is high with a score of 7.5 out of 10.
The affected software version is Rockwell Automation RSLinx Classic Versions up to and including 4.00.01.
This vulnerability allows a remote, unauthenticated threat actor to send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate.
To mitigate this vulnerability, it is recommended to update to a version of Rockwell Automation RSLinx Classic that is later than 4.00.01.