Show filters
273 Total Results
Displaying 41-50 of 273
Sort by:
Attacker Value
Unknown

CVE-2024-21917

Disclosure Date: January 31, 2024 (last updated February 08, 2024)
A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious user to obtain the service token and use it for authentication on another FTSP directory. This is due to the lack of digital signing between the FTSP service token and directory.  If exploited, a malicious user could potentially retrieve user information and modify settings without any authentication.
Attacker Value
Unknown

CVE-2024-21916

Disclosure Date: January 31, 2024 (last updated February 08, 2024)
A denial-of-service vulnerability exists in specific Rockwell Automation ControlLogix ang GuardLogix controllers. If exploited, the product could potentially experience a major nonrecoverable fault (MNRF). The device will restart itself to recover from the MNRF.
Attacker Value
Unknown

CVE-2023-5909

Disclosure Date: November 30, 2023 (last updated December 07, 2023)
KEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect.
Attacker Value
Unknown

CVE-2023-5908

Disclosure Date: November 30, 2023 (last updated December 07, 2023)
KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.
Attacker Value
Unknown

CVE-2023-46290

Disclosure Date: October 27, 2023 (last updated November 08, 2023)
Due to inadequate code logic, a previously unauthenticated threat actor could potentially obtain a local Windows OS user token through the FactoryTalk® Services Platform web service and then use the token to log in into FactoryTalk® Services Platform . This vulnerability can only be exploited if the authorized user did not previously log in into the FactoryTalk® Services Platform web service.
Attacker Value
Unknown

CVE-2023-46289

Disclosure Date: October 27, 2023 (last updated November 08, 2023)
Rockwell Automation FactoryTalk View Site Edition insufficiently validates user input, which could potentially allow threat actors to send malicious data bringing the product offline. If exploited, the product would become unavailable and require a restart to recover resulting in a denial-of-service condition.
Attacker Value
Unknown

CVE-2023-27858

Disclosure Date: October 27, 2023 (last updated December 18, 2024)
Rockwell Automation Arena Simulation contains an arbitrary code execution vulnerability that could potentially allow a malicious user to commit unauthorized code to the software by using an uninitialized pointer in the application.  The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product.  The user would need to open a malicious file provided to them by the attacker for the code to execute.
Attacker Value
Unknown

CVE-2023-27854

Disclosure Date: October 27, 2023 (last updated December 18, 2024)
An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow.  The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product.  The user would need to open a malicious file provided to them by the attacker for the code to execute.
Attacker Value
Unknown

CVE-2023-29464

Disclosure Date: October 13, 2023 (last updated October 21, 2023)
FactoryTalk Linx, in the Rockwell Automation PanelView Plus, allows an unauthenticated threat actor to read data from memory via crafted malicious packets. Sending a size larger than the buffer size results in leakage of data from memory resulting in an information disclosure. If the size is large enough, it causes communications over the common industrial protocol to become unresponsive to any type of packet, resulting in a denial-of-service to FactoryTalk Linx over the common industrial protocol.
Attacker Value
Unknown

CVE-2023-2262

Disclosure Date: September 20, 2023 (last updated October 08, 2023)
A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.