cve/2024/CVE-2024-6098.md
2024-08-17 18:41:15 +00:00

22 lines
1.3 KiB
Markdown

### [CVE-2024-6098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6098)
![](https://img.shields.io/static/v1?label=Product&message=IGS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Kepware%20KEPServerEX&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Kepware%20ThingWorx%20Kepware%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TOP%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20V6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20V7.6x%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen)
### Description
When performing an online tag generation to devices which communicate using the ControlLogix protocol, a machine-in-the-middle, or a device that is not configured correctly, could deliver a response leading to unrestricted or unregulated resource allocation. This could cause a denial-of-service condition and crash the Kepware application. By default, these functions are turned off, yet they remain accessible for users who recognize and require their advantages.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds