First published: Thu Apr 04 2019(Updated: )
A vulnerability was found in Rockwell Automation RSLinx Classic versions 4.10.00 and prior. An input validation issue in a .dll file of RSLinx Classic where the data in a Forward Open service request is passed to a fixed size buffer, allowing an attacker to exploit a stack-based buffer overflow condition.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Rslinx | <=4.10.00 | |
<=4.10.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-6553 is critical with a severity value of 9.8.
CVE-2019-6553 allows an attacker to exploit a stack-based buffer overflow vulnerability in RSLinx Classic versions 4.10.00 and prior.
To fix the vulnerability in Rockwell Automation RSLinx Classic, it is recommended to update to a version higher than 4.10.00.
The Common Weakness Enumeration (CWE) ID for CVE-2019-6553 are 119, 20, 787, and 121.
You can find more information about CVE-2019-6553 at the following link: [https://ics-cert.us-cert.gov/advisories/ICSA-19-064-01](https://ics-cert.us-cert.gov/advisories/ICSA-19-064-01)