ID CVE-2019-10954
Summary An attacker could send crafted SMTP packets to cause a denial-of-service condition where the controller enters a major non-recoverable faulted state (MNRF) in CompactLogix 5370 L1, L2, and L3 Controllers, Compact GuardLogix 5370 controllers, and Armor Compact GuardLogix 5370 Controllers Versions 20 - 30 and earlier.
References
Vulnerable Configurations
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l1_firmware:20.011:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l1_firmware:20.011:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l1_firmware:20.012:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l1_firmware:20.012:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l1_firmware:20.013:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l1_firmware:20.013:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l1_firmware:30.014:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l1_firmware:30.014:*:*:*:*:*:*:*
  • cpe:2.3:h:rockwellautomation:compactlogix_5370_l1:-:*:*:*:*:*:*:*
    cpe:2.3:h:rockwellautomation:compactlogix_5370_l1:-:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l2_firmware:20.011:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l2_firmware:20.011:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l2_firmware:20.012:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l2_firmware:20.012:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l2_firmware:20.013:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l2_firmware:20.013:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l2_firmware:30.014:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l2_firmware:30.014:*:*:*:*:*:*:*
  • cpe:2.3:h:rockwellautomation:compactlogix_5370_l2:-:*:*:*:*:*:*:*
    cpe:2.3:h:rockwellautomation:compactlogix_5370_l2:-:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l3_firmware:20.011:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l3_firmware:20.011:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l3_firmware:20.012:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l3_firmware:20.012:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l3_firmware:20.013:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l3_firmware:20.013:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compactlogix_5370_l3_firmware:30.014:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compactlogix_5370_l3_firmware:30.014:*:*:*:*:*:*:*
  • cpe:2.3:h:rockwellautomation:compactlogix_5370_l3:-:*:*:*:*:*:*:*
    cpe:2.3:h:rockwellautomation:compactlogix_5370_l3:-:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compact_guardlogix_5370_firmware:20.011:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compact_guardlogix_5370_firmware:20.011:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compact_guardlogix_5370_firmware:20.012:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compact_guardlogix_5370_firmware:20.012:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compact_guardlogix_5370_firmware:20.013:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compact_guardlogix_5370_firmware:20.013:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:compact_guardlogix_5370_firmware:30.014:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:compact_guardlogix_5370_firmware:30.014:*:*:*:*:*:*:*
  • cpe:2.3:h:rockwellautomation:compact_guardlogix_5370:-:*:*:*:*:*:*:*
    cpe:2.3:h:rockwellautomation:compact_guardlogix_5370:-:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:armor_compact_guardlogix_5370_firmware:20.011:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:armor_compact_guardlogix_5370_firmware:20.011:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:armor_compact_guardlogix_5370_firmware:20.012:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:armor_compact_guardlogix_5370_firmware:20.012:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:armor_compact_guardlogix_5370_firmware:20.013:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:armor_compact_guardlogix_5370_firmware:20.013:*:*:*:*:*:*:*
  • cpe:2.3:o:rockwellautomation:armor_compact_guardlogix_5370_firmware:30.014:*:*:*:*:*:*:*
    cpe:2.3:o:rockwellautomation:armor_compact_guardlogix_5370_firmware:30.014:*:*:*:*:*:*:*
  • cpe:2.3:h:rockwellautomation:armor_compact_guardlogix_5370:-:*:*:*:*:*:*:*
    cpe:2.3:h:rockwellautomation:armor_compact_guardlogix_5370:-:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 20-06-2023 - 15:15)
Impact:
Exploitability:
CWE CWE-121
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:C
refmap via4
bid 108118
misc https://ics-cert.us-cert.gov/advisories/ICSA-19-120-01
Last major update 20-06-2023 - 15:15
Published 01-05-2019 - 19:29
Last modified 20-06-2023 - 15:15
Back to Top