{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T17:25:03.815","vulnerabilities":[{"cve":{"id":"CVE-2013-2806","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2019-03-26T17:29:00.247","lastModified":"2024-11-21T01:52:23.957","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the “End of Current Record” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to a specifically oversized value, the service will calculate an undersized value for the “Total Record Size.” Then the service will calculate an incorrect value for the “End of Current Record” field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599"},{"lang":"es","value":"El software RSLinx Enterprise de Rockwell Automation (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 y CPR9-SR6 no maneja la entrada correctamente y da como resultado un error lógico si calcula un valor incorrecto para el campo “End of Current Record”. Al enviar un datagrama al servicio a través del puerto 4444 / UDP con el campo “Record Data Size”modificado a un valor específicamente sobredimensionado, el servicio calculará un valor de tamaño insuficiente para el “Total Record Size.”. Luego, el servicio calculará un valor incorrecto para el campo “End of Current Record”, causando violaciones de acceso que conducen a un bloqueo del servicio. El servicio se puede recuperar con un reinicio manual. Los parches y detalles relacionados con estas vulnerabilidades se pueden encontrar en el siguiente enlace de aviso de seguridad de Rockwell Automation (se requiere inicio de sesión): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/5375"}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-190"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-190"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.10.00:*:*:*:*:*:*:*","matchCriteriaId":"D42DF440-5AC1-4B7D-9A32-A30E2807D21B"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.10.01:*:*:*:*:*:*:*","matchCriteriaId":"436B1B6F-7B5F-4851-A04B-8E4FD1CCE75B"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.20.00:*:*:*:*:*:*:*","matchCriteriaId":"ECE341BF-F144-4F44-A232-0F4CB97CEAFF"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.21.00:*:*:*:*:*:*:*","matchCriteriaId":"9B9B5530-419A-4587-A1D9-9E92ABB99300"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.30.00:*:*:*:*:*:*:*","matchCriteriaId":"49BDD83C-D14A-434D-BA89-8451011C5F07"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.40.00:*:*:*:*:*:*:*","matchCriteriaId":"7C37C557-4DA4-4A4F-8F5A-33DF41D37C45"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.50.00:*:*:*:*:*:*:*","matchCriteriaId":"6F17A84F-CFA8-4BA9-A3D5-9044F53FC9FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.51.00:*:*:*:*:*:*:*","matchCriteriaId":"4648726F-63DB-4F97-9A20-B224FDE5AA53"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.60.00:*:*:*:*:*:*:*","matchCriteriaId":"33F649D7-E46D-4378-B044-ABC7C20D1AAD"}]}]}],"references":[{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}