The NCCIC has released an advisory on a stack-based buffer overflow vulnerability in Rockwell Automation RSLinx Classic. Versions 4.10.00 and prior are affected. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the target device. Rockwell Automation has released patches to address earlier versions of RSLinx Classic including v3.60, v3.70, v3.80, v3.81, v3.90, v4.00.01, v4.10. The NCCIC also advises on a series of measures for mitigating this vulnerability. Read the advisory at NCCIC/ICS-CERT.
You are here
Related Resources
Jan 16, 2025 in Cybersecurity, in OT-ICS Security, in Security Preparedness
Jan 16, 2025 in Cybersecurity, in OT-ICS Security, in Federal & State Resources
Jan 16, 2025 in Cybersecurity, in Federal & State Resources, in Security Preparedness