First published: Mon Apr 15 2024(Updated: )
An input validation vulnerability exists in the Rockwell Automation 5015-AENFTXT that causes the secondary adapter to result in a major nonrecoverable fault (MNRF) when malicious input is entered. If exploited, the availability of the device will be impacted, and a manual restart is required. Additionally, a malformed PTP packet is needed to exploit this vulnerability.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Rockwell Automation 5015-AENFTXT Firmware | =2.011 | |
Rockwell Automation 5015-AENFTXT Firmware | ||
Rockwell Automation 5015-AENFTXT Firmware |
Update the v2.12. Users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-2424 is considered high due to its potential impact on device availability.
To fix CVE-2024-2424, ensure that you update the Rockwell Automation 5015-AENFTXT Firmware to the latest version that resolves this input validation vulnerability.
CVE-2024-2424 affects devices running Rockwell Automation 5015-AENFTXT Firmware version 2.011.
Exploitation of CVE-2024-2424 can result in a major nonrecoverable fault, disrupting the availability of the affected device.
Yes, a manual restart is required to recover the device after exploiting CVE-2024-2424.