mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
226 lines
12 KiB
JSON
226 lines
12 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-12373",
|
|
"ASSIGNER": "PSIRT@rockwellautomation.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A denial-of-service vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in a buffer-overflow, potentially causing denial-of-service."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Rockwell Automation",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "PM1k 1408-BC3A-485",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-BC3A-ENT",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-TS3A-485",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-TS3A-ENT",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-EM3A-485",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-EM3A-ENT",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-TR1A-485",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-TR2A-485",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<v4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-EM1A-485",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-EM2A-485",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-TR1A-ENT",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-TR2A-ENT",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-EM1A-ENT",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "PM1k 1408-EM2A-ENT",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "<4.020"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1714.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1714.html"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.2.0"
|
|
},
|
|
"source": {
|
|
"advisory": "SD1714",
|
|
"discovery": "EXTERNAL"
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "<table><tbody><tr><td><p>Affected Products</p></td><td><p>Affected firmware revision</p></td><td><p>Corrected in firmware revision</p></td></tr><tr><td><p>PM1k 1408-BC3A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-BC3A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TS3A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TS3A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM3A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM3A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TR1A-485<b></b></p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TR2A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM1A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM2A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TR1A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TR2A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM1A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM2A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr></tbody></table>\n\n<br>\n\n<p><b>Mitigations and Workarounds</b></p><p>Users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. </p><p>\u00b7 <a target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\">Security Best Practices</a></p>\n\n<br>"
|
|
}
|
|
],
|
|
"value": "Affected Products\n\nAffected firmware revision\n\nCorrected in firmware revision\n\nPM1k 1408-BC3A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-BC3A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-TS3A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-TS3A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-EM3A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-EM3A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-TR1A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-TR2A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-EM1A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-EM2A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-TR1A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-TR2A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-EM1A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-EM2A-ENT\n\n<4.020\n\n4.020\n\n\n\n\n\n\nMitigations and Workarounds\n\nUsers using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. \u00a0 \n\n\u00b7 \u00a0 \u00a0 \u00a0 Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
|
|
}
|
|
]
|
|
} |