CVE-2019-10952
01.05.2019, 20:29
An attacker could send a crafted HTTP/HTTPS request to render the web server unavailable and/or lead to remote code execution caused by a stack-based buffer overflow vulnerability. A cold restart is required for recovering CompactLogix 5370 L1, L2, and L3 Controllers, Compact GuardLogix 5370 controllers, and Armor Compact GuardLogix 5370 Controllers Versions 20 - 30 and earlier.Enginsight
Vendor | Product | Version |
---|---|---|
rockwellautomation | compactlogix_5370_l1_firmware | 20.011 ≤ 𝑥 ≤ 30.014 |
rockwellautomation | compactlogix_5370_l2_firmware | 20.011 ≤ 𝑥 ≤ 30.014 |
rockwellautomation | compactlogix_5370_l3_firmware | 20.011 ≤ 𝑥 ≤ 30.014 |
rockwellautomation | armor_compact_guardlogix_5370_firmware | 20.011 ≤ 𝑥 ≤ 30.014 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-400 - Uncontrolled Resource ConsumptionThe software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.
References