Vulnerability Details : CVE-2023-1834
Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running v7.13 may have the telnet and FTP ports open by default. This could potentially allow attackers unauthorized access to the device through the open ports.
Vulnerability category: BypassGain privilege
Products affected by CVE-2023-1834
- cpe:2.3:o:rockwellautomation:kinetix_5500_firmware:7.13:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-1834
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-1834
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |
3.9
|
5.2
|
NIST | |
9.4
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H |
3.9
|
5.5
|
Rockwell Automation |
CWE ids for CVE-2023-1834
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: PSIRT@rockwellautomation.com (Secondary)
References for CVE-2023-1834
-
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-09
Rockwell Automation Kinetix 5500 | CISAThird Party Advisory;US Government Resource
-
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139441
Open Ports Vulnerability in Kinetix 5500 EtherNet/IP Servo DrivePermissions Required
Jump to