First published: Fri Mar 17 2023(Updated: )
Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected device’s Modbus TCP Server AOI information.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Modbus Tcp Server Add On Instructions | >=2.00.00<2.04.00 |
Customers should update their software to versions 2.04.00 and later to mitigate this issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0027 is a vulnerability in Rockwell Automation Modbus TCP Server AOI prior to version 2.04.00.
CVE-2023-0027 has a severity rating of 4.3 (medium).
The affected software is Rockwell Automation Modbus TCP Server AOI version prior to 2.04.00.
CVE-2023-0027 allows an unauthorized user to send a malformed message, causing the controller to respond with a copy of the most recent response to the last valid request.
CVE-2023-0027 can be exploited by an unauthorized user to read the connected devices.