![]() ![]() Rockwell Automation provides industrial automation control and information products worldwide across a wide range of industries. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their environment, architecture, and product implementation. ![]() Impact to individual organizations depends on many factors that are unique to each organization. However, the exploitability subscore is low (3.2) because of the difficulty of exploiting this vulnerability. The CVSS impact subscore for this vulnerability, as calculated by ICS-CERT, is high (10) because successfully exploiting this vulnerability would allow an attacker to run arbitrary code on the target machine. AFFECTED PRODUCTSĮDS Hardware Installation Tool Version 1.0.5.1 and earlier. ![]() This vulnerability is likely exploitable however, significant user interaction would be required. A buffer overflow vulnerability exists in the Rockwell Automation RSLinx Classic EDS Hardware Installation Tool (RSHWare.exe). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |