Show filters
273 Total Results
Displaying 91-100 of 273
Sort by:
Attacker Value
Unknown
CVE-2022-3156
Disclosure Date: December 27, 2022 (last updated November 08, 2023)
A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software. Users are granted elevated permissions on certain product services when the software is installed. Due to
this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software.
0
Attacker Value
Unknown
CVE-2022-3752
Disclosure Date: December 19, 2022 (last updated November 08, 2023)
An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic
loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload
the user project file to bring the device back online and continue normal operation.
0
Attacker Value
Unknown
CVE-2022-46670
Disclosure Date: December 16, 2022 (last updated November 08, 2023)
Rockwell Automation was made aware of a vulnerability by a security researcher from Georgia Institute of Technology that the MicroLogix 1100 and 1400 controllers contain a vulnerability that may give an attacker the ability to accomplish remote code execution. The vulnerability is an unauthenticated stored cross-site scripting vulnerability in the embedded webserver. The payload is transferred to the controller over SNMP and is rendered on the homepage of the embedded website.
0
Attacker Value
Unknown
CVE-2022-3157
Disclosure Date: December 16, 2022 (last updated November 08, 2023)
A vulnerability exists in the Rockwell Automation controllers that allows a malformed CIP request to cause a major non-recoverable fault (MNRF) and a denial-of-service condition (DOS).
0
Attacker Value
Unknown
CVE-2022-3166
Disclosure Date: December 16, 2022 (last updated November 08, 2023)
Rockwell Automation was made aware that the webservers of the Micrologix 1100 and 1400 controllers contain a vulnerability that may lead to a denial-of-service condition. The security vulnerability could be exploited by an attacker with network access to the affected systems by sending TCP packets to webserver and closing it abruptly which would cause a denial-of-service condition for the web server application on the device
0
Attacker Value
Unknown
CVE-2022-38744
Disclosure Date: October 27, 2022 (last updated February 24, 2025)
An unauthenticated attacker with network access to a victim's Rockwell Automation FactoryTalk Alarm and
Events service could open a connection, causing the service to fault and become unavailable. The affected port
could be used as a server ping port and uses messages structured with XML.
0
Attacker Value
Unknown
CVE-2022-3158
Disclosure Date: October 17, 2022 (last updated February 24, 2025)
Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to an input validation vulnerability. The FactoryTalk VantagePoint SQL Server lacks input validation when users enter SQL statements to retrieve information from the back-end database. If successfully exploited, this could allow a user with basic user privileges to perform remote code execution on the server.
0
Attacker Value
Unknown
CVE-2022-38743
Disclosure Date: October 17, 2022 (last updated February 24, 2025)
Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to an improper access control vulnerability. The FactoryTalk VantagePoint SQL Server account could allow a malicious user with read-only privileges to execute SQL statements in the back-end database. If successfully exploited, this could allow the attacker to execute arbitrary code and gain access to restricted data.
0
Attacker Value
Unknown
CVE-2022-38742
Disclosure Date: September 22, 2022 (last updated February 24, 2025)
Rockwell Automation ThinManager ThinServer versions 11.0.0 - 13.0.0 is vulnerable to a heap-based buffer overflow. An attacker could send a specifically crafted TFTP or HTTPS request, causing a heap-based buffer overflow that crashes the ThinServer process. If successfully exploited, this could expose the server to arbitrary remote code execution.
0
Attacker Value
Unknown
CVE-2022-2465
Disclosure Date: August 25, 2022 (last updated February 24, 2025)
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Deserialization of Untrusted Data vulnerability. ISaGRAF Workbench does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in ISaGRAF Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited.
0