Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.
References
Link | Resource |
---|---|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010 | Permissions Required Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Rockwell
Published: 2023-07-12T12:37:01.939Z
Updated: 2023-07-12T13:15:20.247Z
Reserved: 2023-07-10T15:34:52.031Z
Link: CVE-2023-3595
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-07-12T13:15:09.880
Modified: 2023-07-25T19:55:53.177
Link: CVE-2023-3595
JSON object: View
Redhat Information
No data.
CWE