{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-7567", "ASSIGNER": "PSIRT@rockwellautomation.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "A denial-of-service vulnerability exists via the CIP/Modbus port in the Rockwell Automation Micro850/870 (2080 -L50E/2080 -L70E). If exploited, the CIP/Modbus communication may be disrupted for short duration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption", "cweId": "CWE-400" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Rockwell Automation", "product": { "product_data": [ { "product_name": "PLC - Micro850/870 (2080 -L50E/2080 -L70E)", "version": { "version_data": [ { "version_affected": "=", "version_value": "v20.011" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1684.html", "refsource": "MISC", "name": "https://https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1684.html" } ] }, "generator": { "engine": "Vulnogram 0.2.0" }, "source": { "advisory": "SD1684", "discovery": "INTERNAL" }, "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "
Customers using the affected software are encouraged to apply security best practices, if possible.
\u00b7 For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices to minimize the risk of the vulnerability
\n\n