First published: Tue Jul 18 2023(Updated: )
The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing. The new ENIP connections cannot be established if impacted by this vulnerability, which prohibits operational capabilities of the device resulting in a denial-of-service attack.
Credit: PSIRT@rockwellautomation.com PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Kinetix 5700 Firmware | =13.001 | |
Rockwellautomation Kinetix 5700 | =series_a |
* Upgrade to V13.003 or later https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx which has been released to mitigate these issues.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-2263.
The severity of CVE-2023-2263 is high with a severity value of 7.5.
The affected software of CVE-2023-2263 is Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A with firmware version 13.001.
CVE-2023-2263 impacts the Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A by prohibiting new ENIP connections, resulting in a denial-of-service attack.
No, Rockwell Automation Kinetix 5700 Series A is not affected by CVE-2023-2263.