Learn about CVE-2023-2263 affecting Rockwell Automation Kinetix 5700 DC Bus Power Supply, leading to a denial-of-service attack. Mitigate with firmware update.
This CVE-2023-2263 article provides detailed information about a vulnerability in the Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A that could lead to a denial-of-service attack.
Understanding CVE-2023-2263
In CVE-2023-2263, the Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is susceptible to CIP fuzzing, leading to the inability to establish new ENIP connections. As a result, the operational capabilities of the device are hindered, potentially resulting in a denial-of-service attack.
What is CVE-2023-2263?
The vulnerability in the Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A allows for unauthorized use of device resources, as outlined in CAPEC-629.
The Impact of CVE-2023-2263
The vulnerability poses a high availability impact, with a CVSSv3.1 base score of 7.5 (High severity). While it does not affect confidentiality or integrity, it can significantly impact the availability of the affected system.
Technical Details of CVE-2023-2263
The CWE-400 Uncontrolled Resource Consumption issue in the Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A leads to a denial-of-service attack.
Vulnerability Description
The vulnerability allows attackers to perform CIP fuzzing, preventing the establishment of new ENIP connections and impacting the device's operational capabilities.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by malicious actors to exhaust device resources, potentially resulting in a denial-of-service condition.
Mitigation and Prevention
To address CVE-2023-2263 in the Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A, users can take the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates