Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-2263 : Security Advisory and Response

Learn about CVE-2023-2263 affecting Rockwell Automation Kinetix 5700 DC Bus Power Supply, leading to a denial-of-service attack. Mitigate with firmware update.

This CVE-2023-2263 article provides detailed information about a vulnerability in the Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A that could lead to a denial-of-service attack.

Understanding CVE-2023-2263

In CVE-2023-2263, the Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is susceptible to CIP fuzzing, leading to the inability to establish new ENIP connections. As a result, the operational capabilities of the device are hindered, potentially resulting in a denial-of-service attack.

What is CVE-2023-2263?

The vulnerability in the Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A allows for unauthorized use of device resources, as outlined in CAPEC-629.

The Impact of CVE-2023-2263

The vulnerability poses a high availability impact, with a CVSSv3.1 base score of 7.5 (High severity). While it does not affect confidentiality or integrity, it can significantly impact the availability of the affected system.

Technical Details of CVE-2023-2263

The CWE-400 Uncontrolled Resource Consumption issue in the Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A leads to a denial-of-service attack.

Vulnerability Description

The vulnerability allows attackers to perform CIP fuzzing, preventing the establishment of new ENIP connections and impacting the device's operational capabilities.

Affected Systems and Versions

        Product: Kinetix 5700 DC Bus Power Supply Series A
        Vendor: Rockwell Automation
        Affected Version: 13.001

Exploitation Mechanism

The vulnerability can be exploited by malicious actors to exhaust device resources, potentially resulting in a denial-of-service condition.

Mitigation and Prevention

To address CVE-2023-2263 in the Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A, users can take the following steps:

Immediate Steps to Take

        Upgrade to version 13.003 or later, as released by Rockwell Automation, to mitigate the vulnerability.

Long-Term Security Practices

        Implement network segmentation to isolate critical devices from potentially compromised systems.
        Regularly monitor and patch systems to ensure that known vulnerabilities are addressed promptly.

Patching and Updates

        Rockwell Automation has released version 13.003 or later to address CVE-2023-2263. It is recommended to promptly apply this update to secure the affected devices.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now