This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Rockwellautomation First view 2020-10-14
Product Flex I/O 1794-Aent/B Firmware Last view 2020-10-14
Version 4.003 Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:rockwellautomation:flex_i/o_1794-aent/b_firmware

Activity : Overall

Related : CVE

  Date Alert Description
7.5 2020-10-14 CVE-2020-6087

An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability If the ANSI Extended Symbol Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required.

7.5 2020-10-14 CVE-2020-6086

An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.If the Simple Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required.

CWE : Common Weakness Enumeration

%idName
100% (2) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...

Snort® IPS/IDS

Date Description
2020-12-05 TRUFFLEHUNTER TALOS-2020-1007 attack attempt
RuleID : 53128 - Type : PROTOCOL-SCADA - Revision : 1
2020-12-05 TRUFFLEHUNTER TALOS-2020-1007 attack attempt
RuleID : 53127 - Type : PROTOCOL-SCADA - Revision : 1
2020-12-05 TRUFFLEHUNTER TALOS-2020-1006 attack attempt
RuleID : 53049 - Type : PROTOCOL-SCADA - Revision : 2