Learn about CVE-2018-14827 affecting RSLinx Classic by Rockwell Automation. Unauthorized individuals can crash the software by sending malicious packets over Ethernet/IP to Port 44818.
Versions of RSLinx Classic by Rockwell Automation up to 4.00.01 are susceptible to a potential attack where an unauthorized individual, without authentication, has the ability to send specifically designed packets over Ethernet/IP to Port 44818. This can lead to the software application becoming unresponsive and eventually crashing. The user will need to restart the software in order to restore its proper functionality.
Understanding CVE-2018-14827
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality.
What is CVE-2018-14827?
The Impact of CVE-2018-14827
Technical Details of CVE-2018-14827
Versions of RSLinx Classic by Rockwell Automation up to 4.00.01 are affected by this vulnerability.
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
It is crucial to take immediate steps to mitigate the risks posed by CVE-2018-14827.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates