Rockwell Automation products using GoAhead Web Server Loop with Unreachable Exit Condition (CVE-2019-5097)

high Tenable OT Security Plugin ID 500905

Version 1.8

Sep 5, 2024, 5:04 AM

  • Plugin metadata (Add CISA's ICSA Reference Information tag)

Plugin Feed: 202409050504

Version 1.7

Apr 11, 2024, 10:10 PM

  • Plugin metadata

Plugin Feed: 202404112210

Version 1.6

Mar 4, 2024, 2:33 PM

  • Plugin metadata

Plugin Feed: 202403041433

Version 1.5

Nov 30, 2023, 10:20 PM

  • Plugin metadata (detection updated)

Plugin Feed: 202311302220

Version 1.4

Nov 7, 2023, 2:31 AM

  • Plugin metadata

Plugin Feed: 202311070231

Version 1.4

Nov 30, 2023, 8:25 PM

  • Plugin metadata (detection updated)

Plugin Feed: 202311302025

Version 1.3

Jul 24, 2023, 9:08 PM

  • Plugin metadata

Plugin Feed: 202307242108

Version 1.2

Jul 11, 2023, 3:46 PM

  • CVSS temporal metrics ("CVSSv2 temporal vector" set to "CVSS2#E:POC/RL:OF/RC:C". "CVSSv3 temporal vector" set to "CVSS:3.0/E:P/RL:O/RC:C")
  • Exploit attributes ("Exploit available" set to "True". "Exploitability ease" changed from "No known exploits are available" to "Exploits are available")

Plugin Feed: 202307111546

Version 1.2

Jul 24, 2023, 7:10 PM

  • Plugin metadata

Plugin Feed: 202307241910

Version 1.1

May 26, 2023, 1:04 AM

  • Detection (Changed Rockwell classification to prevent false positives)

Plugin Feed: 202305260104

Version 1.0

Mar 28, 2023, 2:03 PM

  • New (Detect vulnerable GoAhead web embedded in Rockwell Automation products)

Plugin Feed: 202303281403

Version 1.0

May 25, 2023, 11:07 PM

  • Detection (Changed Rockwell classification to prevent false positives)

Plugin Feed: 202305252307

* Changelogs are generally available for changes made after Nov 1, 2022