SARA / Free Tools / CVE / CVE-2023-3595

CVE-2023-3595 — Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN

Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes t

CVSS
9.8 CRITICAL
EPSS
31.58% (top 3.30%)
CWE
CWE-787
Published
2023-07-12T12:37:01.939Z
Last modified
2024-08-02T07:01:57.031Z
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

01What is this vulnerability?

Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

02Affected products

VendorProductVersions
Rockwell Automation1756EN2T Series A, B, C — <=5.008 & 5.028
Rockwell Automation1756EN2T Series D — <=11.003
Rockwell Automation1756EN2TK Series A, B, C — <=5.008 & 5.028
Rockwell Automation1756EN2TXT Series A, B, C — <=5.008 & 5.028
Rockwell Automation1756EN2TXT Series D — <=11.003
Rockwell Automation1756EN2TP Series A — <=11.003
Rockwell Automation1756EN2TPK Series A — <=11.003
Rockwell Auotmation1756EN2TPXT Series A — <=11.003
Rockwell Automation1756EN2TR Series A, B — <=5.008 & 5.028
Rockwell Automation1756EN2TR Series C — <=11.003
Rockwell Automation1756EN2TRK Series A, B — <=5.008 & 5.028
Rockwell Automation1756EN2TRK Series C — <=11.003
Rockwell Automation1756EN2TRXT Series A, B — <=5.008 & 5.028
Rockwell Automation1756EN2TRXT Series C — <=11.003
Rockwell Automation1756EN2F Series A, B — <=5.008 & 5.028
Rockwell Automation1756EN2F Series C — <=11.003
Rockwell Automation1756EN2FK Series A, B — <=5.008 & 5.028
Rockwell Automation1756EN2FK Series C — <=11.003
Rockwell Automation1756EN3TR Series A — <=5.008 & 5.028
Rockwell Automation1756EN3TR Series B — <=11.003
Rockwell Automation1756EN3TRK Series A — <=5.008 & 5.028
Rockwell Automation1756EN3TRK Series B — <=11.003

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →