First published: Mon Mar 25 2024(Updated: )
A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper traffic throttling in the device. If multiple data packets are sent to the device repeatedly the device will crash and require a manual restart to recover.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation PowerFlex 527 AC Drives | ||
All of | ||
Rockwell Automation PowerFlex 527 AC Drives Firmware | >=2.001 | |
Rockwell Automation PowerFlex 527 AC Drives |
There is no fix currently for this vulnerability. Users using the affected software are encouraged to apply risk mitigations and security best practices, where possible. * Implement network segmentation confirming the device is on an isolated network. * Disable the web server https://literature.rockwellautomation.com/idc/groups/literature/documents/um/520-um002_-en-e.pdf , if not needed. The web server is disabled by default. Disabling this feature is available in v2.001.x and later. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2427 is classified as a denial-of-service vulnerability with a critical impact on the affected device.
To mitigate CVE-2024-2427, ensure the device firmware is updated to the latest version provided by Rockwell Automation.
CVE-2024-2427 affects the Rockwell Automation PowerFlex® 527 and its associated firmware versions starting from 2.001.
The denial-of-service in CVE-2024-2427 is triggered by improper traffic throttling, allowing multiple data packets to crash the device.
Recovery from CVE-2024-2427 requires a manual restart of the Rockwell Automation PowerFlex® 527 after it crashes.