{"vulnerability": "CVE-2020-13573", "sightings": [{"uuid": "aa67031c-a658-4102-bc8d-ba51dd312a9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13573", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2451", "content": "#SCADA_Security\nCVE-2020-13573:\nRockwell Automation RSLinx classic ethernet/IP server denial-of-service vulnerability\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1184", "creation_timestamp": "2024-09-16T16:07:57.000000Z"}, {"uuid": "e1b4f4b6-7fe6-43c4-b212-9d1dd48883fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13573", "type": "seen", "source": "https://t.me/cibsecurity/21759", "content": "\u203c CVE-2020-13573 \u203c\n\nA denial-of-service vulnerability exists in the Ethernet/IP server functionality of Rockwell Automation RSLinx Classic 2.57.00.14 CPR 9 SR 3. A specially crafted network request can lead to a denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-07T20:40:43.000000Z"}]}