CVE-2024-6436

Improper Input Validation (CWE-20)

Published: Sep 27, 2024 / Updated: 53d ago

010
CVSS 8.7EPSS 0.04%High
CVE info copied to clipboard

An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

CVE Assignment

NVD published the first details for CVE-2024-6436

Sep 27, 2024 at 8:15 PM
First Article

Feedly found the first article mentioning CVE-2024-6436. See article

Sep 27, 2024 at 8:21 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Sep 27, 2024 at 8:21 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.6%)

Sep 28, 2024 at 9:21 AM
Static CVE Timeline Graph

Affected Systems

Rockwellautomation
+null more

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-10: Buffer Overflow via Environment Variables
+null more

News

CVE-2024-6436
High Severity Description An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted. Read more at https://www.tenable.com/cve/CVE-2024-6436
CVE-2024-6436 | Rockwell Automation SequenceManager prior 2.0 denial of service
A vulnerability was found in Rockwell Automation SequenceManager prior 2.0 . It has been rated as critical . Affected by this issue is some unknown functionality. The manipulation leads to denial of service. This vulnerability is handled as CVE-2024-6436 . The attack may be launched remotely. There is no exploit available.
CVE-2024-6436
Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition.
NA - CVE-2024-6436 - An input validation vulnerability exists in the...
An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service...
CVE-2024-6436
An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute...
See 5 more articles and social media posts

CVSS V3.1

Unknown

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI