Note:
This project will be discontinued after December 13, 2021. [more]
Product:
1756\-En4tr_firmware
(Rockwellautomation)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-04-15 | CVE-2024-3493 | A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices. | 1756\-En4tr_firmware, Compact_guardlogix_5380_firmware, Compactlogix_5380_firmware, Compactlogix_5380_process_firmware, Compactlogix_5480_firmware, Controllogix_5580_firmware, Controllogix_5580_process_firmware, Guardlogix_5580_firmware | 7.5 | ||
2024-10-08 | CVE-2024-8626 | Due to a memory leak, a denial-of-service vulnerability exists in the Rockwell Automation affected products. A malicious actor could exploit this vulnerability by performing multiple actions on certain web pages of the product causing the affected products to become fully unavailable and require a power cycle to recover. | 1756\-En4tr_firmware, Compact_guardlogix_5380_firmware, Compactlogix_5380_firmware, Compactlogix_5480_firmware, Controllogix_5580_firmware, Guardlogix_5580_firmware | 7.5 | ||
2023-07-12 | CVE-2023-3596 | Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages. | 1756\-En4tr_firmware, 1756\-En4trk_firmware, 1756\-En4trxt_firmware | 7.5 |