An attacker could send a crafted HTTP/HTTPS request to render the web server unavailable and/or lead to remote code execution caused by a stack-based buffer overflow vulnerability. A cold restart is required for recovering CompactLogix 5370 L1, L2, and L3 Controllers, Compact GuardLogix 5370 controllers, and Armor Compact GuardLogix 5370 Controllers Versions 20 - 30 and earlier.
2019-05-01T20:29:00.257
2024-11-21T04:20:13.320
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | rockwellautomation | compactlogix_5370_l1_firmware | ≤ 30.014 | Yes |
Hardware | rockwellautomation | compactlogix_5370_l1 | - | No |
Operating System | rockwellautomation | compactlogix_5370_l2_firmware | ≤ 30.014 | Yes |
Hardware | rockwellautomation | compactlogix_5370_l2 | - | No |
Operating System | rockwellautomation | compactlogix_5370_l3_firmware | ≤ 30.014 | Yes |
Hardware | rockwellautomation | compactlogix_5370_l3 | - | No |
Operating System | rockwellautomation | armor_compact_guardlogix_5370_firmware | ≤ 30.014 | Yes |
Hardware | rockwellautomation | armor_compact_guardlogix_5370 | - | No |