CVE-2018-14821

HIGH

Rockwell Automation RSLinx Classic <4.00.01 - DoS

Title source: llm
STIX 2.1

Description

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.

References (2)

Core 2
Core References
Third Party Advisory, US Government Resource x_refsource_misc
https://ics-cert.us-cert.gov/advisories/ICSA-18-263-02
Exploit, Third Party Advisory x_refsource_misc
https://www.tenable.com/security/research/tra-2018-26

Scores

CVSS v3 7.5
EPSS 0.0169
EPSS Percentile 82.3%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-119 CWE-122
Status published
Products (1)
rockwellautomation/rslinx < 4.00.01
Published Sep 20, 2018
Tracked Since Feb 18, 2026