ID

VAR-201809-0161


CVE

CVE-2018-14829


TITLE

Rockwell Automation RSLinx Classic Denial of service vulnerability

Trust: 0.8

sources: IVD: 2fd88103-2ae4-43ed-a3a5-d58f595946b6 // CNVD: CNVD-2019-09765

DESCRIPTION

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code. Rockwell Automation RSLinx Classic Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The solution supports access to Rockwell Software and Allen-Bradley applications via Allen-Bradley programmable controllers. A stack-based buffer-overflow vulnerability. 2. A heap-based buffer-overflow vulnerability. 3. A denial-of-service vulnerability

Trust: 2.7

sources: NVD: CVE-2018-14829 // JVNDB: JVNDB-2018-010783 // CNVD: CNVD-2019-09765 // BID: 108501 // IVD: 2fd88103-2ae4-43ed-a3a5-d58f595946b6 // VULHUB: VHN-125027

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 2fd88103-2ae4-43ed-a3a5-d58f595946b6 // CNVD: CNVD-2019-09765

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:rslinxscope:lteversion:4.00.01

Trust: 1.0

vendor:rockwell automationmodel:rslinx classicscope:lteversion:4.00.01

Trust: 0.8

vendor:rockwallmodel:automation rslinx classicscope:lteversion:<=4.00.01

Trust: 0.6

vendor:rockwellautomationmodel:rslinxscope:eqversion:4.00.01

Trust: 0.6

vendor:rockwellmodel:automation rslinx classicscope:eqversion:4.00.01

Trust: 0.3

vendor:rockwellmodel:automation rslinx classicscope:eqversion:3.90.01

Trust: 0.3

vendor:rockwellmodel:automation rslinx classicscope:eqversion:3.73.00

Trust: 0.3

vendor:rockwellmodel:automation rslinx classicscope:eqversion:3.72.00

Trust: 0.3

vendor:rockwellmodel:automation rslinx classicscope:eqversion:1.0.5.1

Trust: 0.3

vendor:rslinxmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 2fd88103-2ae4-43ed-a3a5-d58f595946b6 // CNVD: CNVD-2019-09765 // BID: 108501 // JVNDB: JVNDB-2018-010783 // CNNVD: CNNVD-201809-948 // NVD: CVE-2018-14829

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-14829
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-14829
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-09765
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201809-948
value: CRITICAL

Trust: 0.6

IVD: 2fd88103-2ae4-43ed-a3a5-d58f595946b6
value: CRITICAL

Trust: 0.2

VULHUB: VHN-125027
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-14829
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-09765
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 2fd88103-2ae4-43ed-a3a5-d58f595946b6
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-125027
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-14829
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 2fd88103-2ae4-43ed-a3a5-d58f595946b6 // CNVD: CNVD-2019-09765 // VULHUB: VHN-125027 // JVNDB: JVNDB-2018-010783 // CNNVD: CNNVD-201809-948 // NVD: CVE-2018-14829

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

problemtype:CWE-121

Trust: 1.0

sources: VULHUB: VHN-125027 // JVNDB: JVNDB-2018-010783 // NVD: CVE-2018-14829

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201809-948

TYPE

Buffer error

Trust: 0.8

sources: IVD: 2fd88103-2ae4-43ed-a3a5-d58f595946b6 // CNNVD: CNNVD-201809-948

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-010783

PATCH

title:RSLinxurl:https://www.rockwellautomation.com/rockwellsoftware/products/rslinx.page

Trust: 0.8

title:Rockwell Automation RSLinx Classic Denial of Service Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/158515

Trust: 0.6

title:Rockwell Automation RSLinx Classic Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85063

Trust: 0.6

sources: CNVD: CNVD-2019-09765 // JVNDB: JVNDB-2018-010783 // CNNVD: CNNVD-201809-948

EXTERNAL IDS

db:NVDid:CVE-2018-14829

Trust: 3.6

db:ICS CERTid:ICSA-18-263-02

Trust: 2.8

db:TENABLEid:TRA-2018-26

Trust: 1.7

db:CNNVDid:CNNVD-201809-948

Trust: 0.9

db:CNVDid:CNVD-2019-09765

Trust: 0.8

db:JVNDBid:JVNDB-2018-010783

Trust: 0.8

db:BIDid:108501

Trust: 0.3

db:IVDid:2FD88103-2AE4-43ED-A3A5-D58F595946B6

Trust: 0.2

db:VULHUBid:VHN-125027

Trust: 0.1

sources: IVD: 2fd88103-2ae4-43ed-a3a5-d58f595946b6 // CNVD: CNVD-2019-09765 // VULHUB: VHN-125027 // BID: 108501 // JVNDB: JVNDB-2018-010783 // CNNVD: CNNVD-201809-948 // NVD: CVE-2018-14829

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-263-02

Trust: 2.8

url:https://www.tenable.com/security/research/tra-2018-26

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-14829

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-14829

Trust: 0.8

url:https://www.rockwellautomation.com/en_in/overview.page

Trust: 0.3

sources: CNVD: CNVD-2019-09765 // VULHUB: VHN-125027 // BID: 108501 // JVNDB: JVNDB-2018-010783 // CNNVD: CNNVD-201809-948 // NVD: CVE-2018-14829

CREDITS

Tenable and Younes Dragoni and Alessandro Di Pinto of Nozomi Networks

Trust: 0.3

sources: BID: 108501

SOURCES

db:IVDid:2fd88103-2ae4-43ed-a3a5-d58f595946b6
db:CNVDid:CNVD-2019-09765
db:VULHUBid:VHN-125027
db:BIDid:108501
db:JVNDBid:JVNDB-2018-010783
db:CNNVDid:CNNVD-201809-948
db:NVDid:CVE-2018-14829

LAST UPDATE DATE

2024-11-23T21:52:50.654000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-09765date:2019-04-12T00:00:00
db:VULHUBid:VHN-125027date:2019-10-09T00:00:00
db:BIDid:108501date:2018-09-20T00:00:00
db:JVNDBid:JVNDB-2018-010783date:2018-12-21T00:00:00
db:CNNVDid:CNNVD-201809-948date:2019-10-17T00:00:00
db:NVDid:CVE-2018-14829date:2024-11-21T03:49:53.123

SOURCES RELEASE DATE

db:IVDid:2fd88103-2ae4-43ed-a3a5-d58f595946b6date:2019-04-12T00:00:00
db:CNVDid:CNVD-2019-09765date:2019-04-12T00:00:00
db:VULHUBid:VHN-125027date:2018-09-20T00:00:00
db:BIDid:108501date:2018-09-20T00:00:00
db:JVNDBid:JVNDB-2018-010783date:2018-12-21T00:00:00
db:CNNVDid:CNNVD-201809-948date:2018-09-21T00:00:00
db:NVDid:CVE-2018-14829date:2018-09-20T19:29:00.690