The NCCIC has released an advisory on a stack-based buffer overflow vulnerability in Rockwell Automation RSLinx Classic. Versions 4.10.00 and prior are affected. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the target device. Rockwell Automation has released patches to address earlier versions of RSLinx Classic including v3.60, v3.70, v3.80, v3.81, v3.90, v4.00.01, v4.10. The NCCIC also advises on a series of measures for mitigating this vulnerability. Read the advisory at NCCIC/ICS-CERT.
H2OSecCon 2025- a virtual security event for the water sector - happening May 20th. Register Now!