Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-14827 : Vulnerability Insights and Analysis

Learn about CVE-2018-14827 affecting RSLinx Classic by Rockwell Automation. Unauthorized individuals can crash the software by sending malicious packets over Ethernet/IP to Port 44818.

Versions of RSLinx Classic by Rockwell Automation up to 4.00.01 are susceptible to a potential attack where an unauthorized individual, without authentication, has the ability to send specifically designed packets over Ethernet/IP to Port 44818. This can lead to the software application becoming unresponsive and eventually crashing. The user will need to restart the software in order to restore its proper functionality.

Understanding CVE-2018-14827

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality.

What is CVE-2018-14827?

        CVE ID: CVE-2018-14827
        Date Published: September 20, 2018
        Vendor: Rockwell Automation
        Affected Product: RSLinx Classic
        Vulnerability Type: UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION') CWE-400

The Impact of CVE-2018-14827

        Unauthorized individuals can exploit the vulnerability without authentication
        Sending malicious packets over Ethernet/IP to Port 44818 can cause the software to crash
        Requires manual restart of the software for normal operation

Technical Details of CVE-2018-14827

Versions of RSLinx Classic by Rockwell Automation up to 4.00.01 are affected by this vulnerability.

Vulnerability Description

        Remote, unauthenticated threat actors can send crafted Ethernet/IP packets to Port 44818
        Results in software unresponsiveness and crashes

Affected Systems and Versions

        Product: RSLinx Classic
        Vendor: Rockwell Automation
        Versions Affected: 4.00.01 and prior

Exploitation Mechanism

        Attackers exploit the vulnerability by sending specially crafted packets over Ethernet/IP to Port 44818
        This action causes the software application to become unresponsive and crash

Mitigation and Prevention

It is crucial to take immediate steps to mitigate the risks posed by CVE-2018-14827.

Immediate Steps to Take

        Implement firewall rules to restrict access to Port 44818
        Regularly monitor network traffic for any suspicious activities
        Apply vendor-supplied patches or updates to address the vulnerability

Long-Term Security Practices

        Conduct regular security assessments and penetration testing
        Educate users on safe network practices and potential threats
        Keep software and systems up to date with the latest security patches
        Consider network segmentation to limit the impact of potential attacks
        Stay informed about cybersecurity trends and best practices

Patching and Updates

        Rockwell Automation may release patches or updates to address the vulnerability
        Ensure timely application of patches to secure the software and prevent exploitation

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now