CVE-2024-6436 Vulnerability Details

  /     /     /  

CVE-2024-6436 Metadata Quick Info

CVE Published: 27/09/2024 | CVE Updated: 03/10/2024 | CVE Year: 2024
Source: Rockwell | Vendor: Rockwell Automation | Product: SequenceManagerâ„¢
Status : PUBLISHED

CVE-2024-6436 Description

An input validation vulnerability exists in the Rockwell Automation Sequence Managerâ„¢ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-20
CWE Name: CWE-20 Improper Input Validation
Source: Rockwell Automation

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-153
CAPEC Description: CAPEC-153 Input Data Manipulation


Source: NVD (National Vulnerability Database).