An input validation vulnerability exists in the Rockwell Automation 5015 - AENFTXT when a manipulated PTP packet is sent, causing the secondary adapter to result in a major nonrecoverable fault. If exploited, a power cycle is required to recover the product.
References
Link | Resource |
---|---|
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1680.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
10 Sep 2024, 14:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:rockwellautomation:5015-aenftxt:-:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:5015-aenftxt_firmware:2.011:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | NVD-CWE-noinfo | |
Summary |
|
|
References | () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1680.html - Vendor Advisory | |
First Time |
Rockwellautomation 5015-aenftxt Firmware
Rockwellautomation Rockwellautomation 5015-aenftxt |
16 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-16 17:15
Updated : 2024-09-10 14:05
NVD link : CVE-2024-6089
Mitre link : CVE-2024-6089
CVE.ORG link : CVE-2024-6089
JSON object : View
Products Affected
rockwellautomation
- 5015-aenftxt
- 5015-aenftxt_firmware
CWE