7.8
CVSSv2

CVE-2013-2805

Published: 26/03/2019 Updated: 10/02/2020
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it receives a datagram with an incorrect value in the “Record Data Size” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to an oversized value, an attacker could cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to this vulnerability can be found at the following Rockwell Automation Security Advisory link (login is required): rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rockwellautomation rslinx enterprise 5.10.00

rockwellautomation rslinx enterprise 5.51.00

rockwellautomation rslinx enterprise 5.20.00

rockwellautomation rslinx enterprise 5.21.00

rockwellautomation rslinx enterprise 5.30.00

rockwellautomation rslinx enterprise 5.40.00

rockwellautomation rslinx enterprise 5.10.01

rockwellautomation rslinx enterprise 5.50.00

rockwellautomation rslinx enterprise 5.60.00