Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-263-02 Third Party Advisory US Government Resource
https://www.tenable.com/security/research/tra-2018-26 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2018-09-20T00:00:00

Updated: 2018-09-21T09:57:01

Reserved: 2018-08-01T00:00:00


Link: CVE-2018-14829

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-09-20T19:29:00.690

Modified: 2019-10-09T23:35:18.107


Link: CVE-2018-14829

JSON object: View

cve-icon Redhat Information

No data.