Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-5097 |
CWE-ID | CWE-835 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Compact GuardLogix 5380 Hardware solutions / Firmware CompactLogix 5480 Hardware solutions / Firmware CompactLogix 5380 Hardware solutions / Firmware GuardLogix 5580 Hardware solutions / Firmware ControlLogix 5580 Hardware solutions / Firmware 1756-EN2TP/A Hardware solutions / Firmware 1756-EN2F/C Hardware solutions / Firmware 1765 – EN3TR/B Hardware solutions / Firmware 1756- EN2T/D Hardware solutions / Firmware 1756-EN2TR/C Hardware solutions / Other hardware appliances |
Vendor | Rockwell Automation |
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU23340
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2019-5097
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop in the processing of multi-part/form-data requests in the base GoAhead web server application. A remote attacker can send a specially crafted HTTP request, consume all available system resources and cause denial of service conditions.
MitigationInstall update from vendor's website.
Vulnerable software versionsCompact GuardLogix 5380: 31 - 32
CompactLogix 5480: 32
CompactLogix 5380: 28 - 32
GuardLogix 5580: 31 - 32
ControlLogix 5580: 28 - 32
1756-EN2TR/C: 11.001
1756-EN2TP/A: 11.001
1756-EN2F/C: 11.001
1765 – EN3TR/B: 11.001
1756- EN2T/D: 11.001
http://ics-cert.us-cert.gov/advisories/icsa-23-026-06
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?