First published: Thu Sep 20 2018(Updated: )
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Rslinx | <=4.00.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-14827.
CVE-2018-14827 has a severity rating of 7.5 (High).
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior are affected by CVE-2018-14827.
Exploiting CVE-2018-14827 can cause the software application to stop responding and crash, requiring a restart to regain functionality.
No, CVE-2018-14827 can be exploited remotely by an unauthenticated threat actor.