First published: Mon Mar 25 2024(Updated: )
A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper input validation in the device. If exploited, a disruption in the CIP communication will occur and a manual restart will be required by the user to recover it.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation PowerFlex 527 AC Drives | ||
All of | ||
Rockwell Automation PowerFlex 527 AC Drives Firmware | >=2.001 | |
Rockwell Automation PowerFlex 527 AC Drives |
There is no fix currently for this vulnerability. Users using the affected software are encouraged to apply risk mitigations and security best practices, where possible. * Implement network segmentation confirming the device is on an isolated network. * Disable the web server https://literature.rockwellautomation.com/idc/groups/literature/documents/um/520-um002_-en-e.pdf , if not needed. The web server is disabled by default. Disabling this feature is available in v2.001.x and later. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2426 is categorized as a denial-of-service vulnerability affecting the Rockwell Automation PowerFlex 527.
To mitigate CVE-2024-2426, ensure that you apply any available firmware updates and monitor device inputs to avoid triggering the vulnerability.
Exploitation of CVE-2024-2426 can lead to a disruption in the CIP communication of the affected device, requiring a manual restart for recovery.
CVE-2024-2426 affects the Rockwell Automation PowerFlex 527 AC Drives with firmware version 2.001 and later.
CVE-2024-2426 results from improper input validation within the Rockwell Automation PowerFlex 527, leading to potential denial-of-service conditions.