First published: Wed Aug 02 2023(Updated: )
ROC800-Series RTU devices are vulnerable to an authentication bypass, which could allow an attacker to gain unauthorized access to data or control of the device and cause a denial-of-service condition.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Emerson Roc809 Firmware | ||
Emerson Roc809 | ||
Emerson Roc827 Firmware | ||
Emerson Roc827 | ||
Emerson Roc809l Firmware | ||
Emerson Roc809l | ||
Emerson Roc827l Firmware | ||
Emerson Roc827l | ||
Emerson Dl8000 Firmware | ||
Emerson Dl8000 | ||
: Emerson ROC809 & ROC827— All firmware versions, all hardware series | ||
: Emerson ROC809L & ROC827L— All firmware versions | ||
: Emerson DL8000— All firmware versions, all hardware series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-1935.
The severity of CVE-2023-1935 is critical with a score of 9.4.
The ROC800-Series RTU devices, specifically Emerson Roc809 Firmware, Emerson Roc827 Firmware, Emerson Roc809l Firmware, and Emerson Roc827l Firmware, are affected by CVE-2023-1935.
CVE-2023-1935 could allow an attacker to gain unauthorized access to data or control of the device and cause a denial-of-service condition.
More information about CVE-2023-1935 can be found at the following reference: [link](https://www.cisa.gov/news-events/ics-advisories/icsa-23-206-03).