First published: Wed Jul 12 2023(Updated: )
Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.
Credit: PSIRT@rockwellautomation.com PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation 1756-en4tr Firmware | ||
Rockwellautomation 1756-en4tr | ||
Rockwellautomation 1756-en4trk Firmware | ||
Rockwellautomation 1756-en4trk | ||
Rockwellautomation 1756-en4trxt Firmware | ||
Rockwellautomation 1756-en4trxt |
* Update firmware. Update EN4* ControlLogix communications modules to firmware revision 5.002. * Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks. * Implement detection signatures. Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3596 is a vulnerability that exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products.
CVE-2023-3596 has a severity value of high.
CVE-2023-3596 could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.
Rockwell Automation 1756-EN4TR is affected by CVE-2023-3596.
To fix CVE-2023-3596, it is recommended to apply the necessary patches or updates provided by Rockwell Automation.