#VU81050 Stack-based buffer overflow in Rockwell Automation products - CVE-2023-2262

 

#VU81050 Stack-based buffer overflow in Rockwell Automation products - CVE-2023-2262

Published: September 22, 2023


Vulnerability identifier: #VU81050
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2023-2262
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
1756-EN2T Series A
1756-EN2T Series B
1756-EN2T Series C
1756-EN2T Series D
1756-EN2TR Series A
1756-EN2TR Series B
1756-EN2TR Series C
1756-EN2TRXT Series B
1756-EN2F Series A
1756-EN2F Series B
1756-EN2F Series C
1756-EN2FK Series B
1756-EN3TR Series A
1756-EN3TR Series B
1756-EN2TK Series A
1756-EN2TK Series B
1756-EN2TK Series C
1756-EN2TK Series D
1756-EN2TXT Series A
1756-EN2TXT Series B
1756-EN2TXT Series C
1756-EN2TXT Series D
1756-EN2TP Series A
1756-EN2TPK Series A
1756-EN2TPXT Series A
1756-EN2TRK Series A
1756-EN2TRK Series B
1756-EN2TRK Series C
1756-EN2TRXT Series A
1756-EN2TRXT Series C
1756-EN2FK Series A
1756-EN2FK Series C
1756-EN3TRK Series A
1756-EN3TRK Series B
Software vendor:
Rockwell Automation

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A remote unauthenticated attacker can send a specially crafted CIP request, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links