Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-263-02 Third Party Advisory US Government Resource
https://www.tenable.com/security/research/tra-2018-26 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2018-09-20T00:00:00

Updated: 2018-09-21T09:57:01

Reserved: 2018-08-01T00:00:00


Link: CVE-2018-14821

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-09-20T19:29:00.470

Modified: 2019-10-09T23:35:16.937


Link: CVE-2018-14821

JSON object: View

cve-icon Redhat Information

No data.