ID

VAR-202307-1163


CVE

CVE-2023-3595


TITLE

plural  Rockwell Automation  Out-of-bounds write vulnerabilities in the product

Trust: 0.8

sources: JVNDB: JVNDB-2023-023079

DESCRIPTION

Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device. 1756-en2f series a firmware, 1756-en2f series b firmware, 1756-en2f series c firmware etc. Rockwell Automation The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation 1756 is a scalable controller solution from Rockwell Automation, USA. It can address a large number of I/O points. Rockwell Automation 1756 EN2 and 1756 EN3 have a denial of service vulnerability. The vulnerability is caused by the failure to properly handle the input error message

Trust: 2.25

sources: NVD: CVE-2023-3595 // JVNDB: JVNDB-2023-023079 // CNVD: CNVD-2024-16842 // VULMON: CVE-2023-3595

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-16842

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:1756-en2t series bscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1756-en2t series dscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1756-en2t series ascope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1756-en2f series bscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1756-en2tr series bscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1756-en3tr series bscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1756-en2tr series cscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1756-en2f series ascope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1756-en3tr series ascope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1756-en2f series cscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1756-en2t series cscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1756-en2tr series ascope:eqversion: -

Trust: 1.0

vendor:rockwell automationmodel:1756-en2t series ascope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-en2tr series ascope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-en2f series ascope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-en2tr series bscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-en2f series cscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-en2t series cscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-en2t series dscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-en2t series bscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-en2tr series cscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-en3tr series ascope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-en2f series bscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-en3tr series bscope: - version: -

Trust: 0.8

vendor:rockwellmodel:automation en2scope:eqversion:1756

Trust: 0.6

vendor:rockwellmodel:automation en3scope:eqversion:1756

Trust: 0.6

sources: CNVD: CNVD-2024-16842 // JVNDB: JVNDB-2023-023079 // NVD: CVE-2023-3595

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-3595
value: CRITICAL

Trust: 1.0

PSIRT@rockwellautomation.com: CVE-2023-3595
value: CRITICAL

Trust: 1.0

NVD: CVE-2023-3595
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2024-16842
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-16842
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-3595
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2023-3595
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-16842 // JVNDB: JVNDB-2023-023079 // NVD: CVE-2023-3595 // NVD: CVE-2023-3595

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-023079 // NVD: CVE-2023-3595

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202307-1094

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202307-1094

PATCH

title:Patch for Rockwell Automation 1756 EN2 and 1756 EN3 Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/539901

Trust: 0.6

title:Rockwell Automation 1756 EN2 and 1756 EN3 Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=246124

Trust: 0.6

sources: CNVD: CNVD-2024-16842 // CNNVD: CNNVD-202307-1094

EXTERNAL IDS

db:NVDid:CVE-2023-3595

Trust: 3.9

db:ICS CERTid:ICSA-23-193-01

Trust: 0.8

db:JVNid:JVNVU95608136

Trust: 0.8

db:JVNDBid:JVNDB-2023-023079

Trust: 0.8

db:CNVDid:CNVD-2024-16842

Trust: 0.6

db:AUSCERTid:ESB-2023.3937

Trust: 0.6

db:CNNVDid:CNNVD-202307-1094

Trust: 0.6

db:VULMONid:CVE-2023-3595

Trust: 0.1

sources: CNVD: CNVD-2024-16842 // VULMON: CVE-2023-3595 // JVNDB: JVNDB-2023-023079 // CNNVD: CNNVD-202307-1094 // NVD: CVE-2023-3595

REFERENCES

url:https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2023-3595

Trust: 1.4

url:https://jvn.jp/vu/jvnvu95608136/

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-193-01

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2023.3937

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2023-3595/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2024-16842 // VULMON: CVE-2023-3595 // JVNDB: JVNDB-2023-023079 // CNNVD: CNNVD-202307-1094 // NVD: CVE-2023-3595

SOURCES

db:CNVDid:CNVD-2024-16842
db:VULMONid:CVE-2023-3595
db:JVNDBid:JVNDB-2023-023079
db:CNNVDid:CNNVD-202307-1094
db:NVDid:CVE-2023-3595

LAST UPDATE DATE

2024-08-14T13:52:21.307000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-16842date:2024-04-07T00:00:00
db:VULMONid:CVE-2023-3595date:2023-07-12T00:00:00
db:JVNDBid:JVNDB-2023-023079date:2024-01-25T06:31:00
db:CNNVDid:CNNVD-202307-1094date:2023-07-14T00:00:00
db:NVDid:CVE-2023-3595date:2023-07-25T19:55:53.177

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-16842date:2024-04-07T00:00:00
db:VULMONid:CVE-2023-3595date:2023-07-12T00:00:00
db:JVNDBid:JVNDB-2023-023079date:2024-01-25T00:00:00
db:CNNVDid:CNNVD-202307-1094date:2023-07-12T00:00:00
db:NVDid:CVE-2023-3595date:2023-07-12T13:15:09.880