First published: Mon Mar 25 2024(Updated: )
A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper input validation in the device. If exploited, the web server will crash and need a manual restart to recover it.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation PowerFlex 527 AC Drives | ||
All of | ||
Rockwell Automation PowerFlex 527 AC Drives Firmware | >=2.001 | |
Rockwell Automation PowerFlex 527 AC Drives |
There is no fix currently for this vulnerability. Users using the affected software are encouraged to apply risk mitigations and security best practices, where possible. * Implement network segmentation confirming the device is on an isolated network. * Disable the web server https://literature.rockwellautomation.com/idc/groups/literature/documents/um/520-um002_-en-e.pdf , if not needed. The web server is disabled by default. Disabling this feature is available in v2.001.x and later. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2425 is classified as a denial-of-service vulnerability.
To mitigate CVE-2024-2425, ensure that the firmware of the Rockwell Automation PowerFlex 527 is updated to the latest version.
CVE-2024-2425 affects the Rockwell Automation PowerFlex 527 AC Drives and its firmware versions starting from 2.001.
Exploitation of CVE-2024-2425 can cause the web server of the PowerFlex 527 to crash, requiring a manual restart.
Currently, the recommended action for CVE-2024-2425 is to apply the latest firmware updates to minimize risk.