Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Rockwellautomation
Subscribe
|
1756-en2f Series A
Subscribe
1756-en2f Series A Firmware
Subscribe
1756-en2f Series B
Subscribe
1756-en2f Series B Firmware
Subscribe
1756-en2f Series C
Subscribe
1756-en2f Series C Firmware
Subscribe
1756-en2t Series A
Subscribe
1756-en2t Series A Firmware
Subscribe
1756-en2t Series B
Subscribe
1756-en2t Series B Firmware
Subscribe
1756-en2t Series C
Subscribe
1756-en2t Series C Firmware
Subscribe
1756-en2t Series D
Subscribe
1756-en2t Series D Firmware
Subscribe
1756-en2tr Series A
Subscribe
1756-en2tr Series A Firmware
Subscribe
1756-en2tr Series B
Subscribe
1756-en2tr Series B Firmware
Subscribe
1756-en2tr Series C
Subscribe
1756-en2tr Series C Firmware
Subscribe
1756-en3tr Series A
Subscribe
1756-en3tr Series A Firmware
Subscribe
1756-en3tr Series B
Subscribe
1756-en3tr Series B Firmware
Subscribe
|
No advisories yet.
Solution
* Update firmware. Update EN2* ControlLogix communications modules to mitigated firmware. * Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks. * Implement detection signatures. Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-08-02T07:01:57.031Z
Reserved: 2023-07-10T15:34:52.031Z
Link: CVE-2023-3595
No data.
Status : Modified
Published: 2023-07-12T13:15:09.880
Modified: 2024-11-21T08:17:37.710
Link: CVE-2023-3595
No data.
OpenCVE Enrichment
No data.