Summary
Detail | |||
---|---|---|---|
Vendor | Rockwellautomation | First view | 2020-10-14 |
Product | Flex I/O 1794-Aent/B Firmware | Last view | 2020-10-14 |
Version | 4.003 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:rockwellautomation:flex_i/o_1794-aent/b_firmware |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2020-10-14 | CVE-2020-6087 | An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability If the ANSI Extended Symbol Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required. |
7.5 | 2020-10-14 | CVE-2020-6086 | An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.If the Simple Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (2) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | TRUFFLEHUNTER TALOS-2020-1007 attack attempt RuleID : 53128 - Type : PROTOCOL-SCADA - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2020-1007 attack attempt RuleID : 53127 - Type : PROTOCOL-SCADA - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2020-1006 attack attempt RuleID : 53049 - Type : PROTOCOL-SCADA - Revision : 2 |