Vulnerability Details CVE-2018-14827
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 53.0%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2018-14827
-
cpe:2.3:a:rockwellautomation:rslinx:2.10.18
-
cpe:2.3:a:rockwellautomation:rslinx:2.20.02
-
cpe:2.3:a:rockwellautomation:rslinx:2.43.01
-
cpe:2.3:a:rockwellautomation:rslinx:2.50.00
-
cpe:2.3:a:rockwellautomation:rslinx:2.51.00
-
cpe:2.3:a:rockwellautomation:rslinx:2.52.00
-
cpe:2.3:a:rockwellautomation:rslinx:2.53.00
-
cpe:2.3:a:rockwellautomation:rslinx:2.54.00
-
cpe:2.3:a:rockwellautomation:rslinx:2.55.00
-
cpe:2.3:a:rockwellautomation:rslinx:2.56.00
-
cpe:2.3:a:rockwellautomation:rslinx:2.57.00
-
cpe:2.3:a:rockwellautomation:rslinx:2.57.00.14
-
cpe:2.3:a:rockwellautomation:rslinx:2.58.00
-
cpe:2.3:a:rockwellautomation:rslinx:2.59.02
-
cpe:2.3:a:rockwellautomation:rslinx:3.51.01
-
cpe:2.3:a:rockwellautomation:rslinx:3.60.00
-
cpe:2.3:a:rockwellautomation:rslinx:3.61.00
-
cpe:2.3:a:rockwellautomation:rslinx:3.70.00
-
cpe:2.3:a:rockwellautomation:rslinx:3.71.00
-
cpe:2.3:a:rockwellautomation:rslinx:3.73.00
-
cpe:2.3:a:rockwellautomation:rslinx:3.74.00
-
cpe:2.3:a:rockwellautomation:rslinx:3.80.00
-
cpe:2.3:a:rockwellautomation:rslinx:3.81.00
-
cpe:2.3:a:rockwellautomation:rslinx:3.90.00
-
cpe:2.3:a:rockwellautomation:rslinx:3.90.01
-
cpe:2.3:a:rockwellautomation:rslinx:4.00.01