CVE-2023-3595

critical

Description

Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

References

https://www.tenable.com/blog/rockwell-automation-disconnect-ot-devices-with-public-facing-internet-access-patch-or-mitigate

https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1672.html

https://www.tenable.com/blog/cve-2023-3595-cve-2023-3596-rockwell-automation-controllogix-vulnerabilities-disclosed

https://www.tenable.com/blog/cve-2023-3595-cve-2023-3596-rockwell-automation-controllogix-vulnerabilities-disclosed

https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010

Details

Source: Mitre, NVD

Published: 2023-07-12

Updated: 2023-07-25

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical