Skip to content
  Sunday 15 March 2026
Trending
January 2, 202210 Best Free Rainmeter Skins For Windows 10/11 in 2022 April 14, 2025Phishing Campaigns Utilize Real-Time Email Validation to Steal Credentials July 9, 2024CISA and Partners join ASD’S ACSC to Release Advisory on PRC State-Sponsored Group, APT 40 June 17, 2025Engineer – 3rd Party Cloud Cybersecurity (Remote) May 9, 2024Cybersecurity Ops November 2, 2023Schneider Electric SpaceLogic C-Bus Toolkit November 23, 2025Data Analysis – Cybersecurity Intern April 12, 2023Cybersecurity Update April 12th 2023: Ransom Declined, Action on Kaspersky, & Reign Spyware Unveiled November 13, 2023Insights from Joe Sullivan: Crucial Information for CISOs on the Uber Trial January 3, 2022The 6 Best Cooling Apps for Android (2022 Free Edition)
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  Rockwell Automation Select Communication Modules
Threat Advisories

Rockwell Automation Select Communication Modules

Mister CybersecurityMister Cybersecurity—July 12, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


1. EXECUTIVE SUMMARY

  • CVSS v3 9.8
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Rockwell Automation
  • Equipment: 1756-EN2T, 1756-EN2TK, 1756-EN2TXT, 1756-EN2TP, 1756-EN2TPK, 1756-EN2TPXT, 1756-EN2TR, 1756-EN2TRK, 1756-EN2TRXT, 1756-EN2F, 1756-EN2FK, 1756-EN3TR, 1756-EN3TRK, 1756-EN4TR, 1756-EN4TRK, 1756-EN4TRXT
  • Vulnerabilities: Out-of-bounds Write

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow malicious actors to gain remote access of the running memory of the module and perform malicious activity.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following Rockwell Automation products are affected: 

  • 1756-EN2T Series A, B, and C: Versions 5.008 and 5.028 and prior
  • 1756-EN2T Series D: Versions 11.003 and prior
  • 1756-EN2TK Series A, B, and C: Versions 5.008 and 5.028 and prior
  • 1756-EN2TK Series D: Versions 11.003 and prior
  • 1756-EN2TXT Series A, B, and C: Versions 5.008 and 5.028 and prior
  • 1756-EN2TXT Series D: Versions 11.003 and prior
  • 1756-EN2TP Series A: Versions 11.003 and prior
  • 1756-EN2TPK Series A: Versions 11.003 and prior
  • 1756-EN2TPXT Series A: Versions 11.003 and prior
  • 1756-EN2TR Series A and B: Versions 5.008 and 5.028 and prior
  • 1756-EN2TR Series C: Versions 11.003 and prior
  • 1756-EN2TRK Series A and B: Versions 5.008 and 5.028 and prior
  • 1756-EN2TRK Series C: Versions 11.003 and prior
  • 1756-EN2TRXT Series A and B: Versions 5.008 and 5.028 and prior
  • 1756-EN2TRXT Series C: Versions 11.003 and prior
  • 1756-EN2F Series A and B: Versions 5.008 and 5.028 and prior
  • 1756-EN2F Series C: Versions 11.003 and prior
  • 1756-EN2FK Series A and B: Versions 5.008 and 5.028 and prior
  • 1756-EN2FK Series C: Versions 11.003 and prior
  • 1756-EN3TR Series A: Versions 5.008 and 5.028 and prior
  • 1756-EN3TR Series B: Versions 11.003 and prior
  • 1756-EN3TRK Series A: Versions 5.008 and 5.028 and prior
  • 1756-EN3TRK Series B: Versions 11.003 and prior
  • 1756-EN4TR Series A: Versions 5.001 and prior
  • 1756-EN4TRK Series A: Versions 5.001 and prior
  • 1756-EN4TRXT Series A: Versions 5.001 and prior

3.2 VULNERABILITY OVERVIEW

3.2.1 OUT-OF-BOUNDS WRITE CWE-787 

Where this vulnerability exists in the 1756 EN2* and 1756 EN3* products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

CVE-2023-3595 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

3.2.2 OUT-OF-BOUNDS WRITE CWE-787

Where this vulnerability exists in the 1756-EN4* products, it could allow a malicious user to cause a denial-of-service condition by asserting the target system through maliciously crafted CIP messages.

CVE-2023-3596 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

3.3 BACKGROUND

3.4 RESEARCHER

More stories

CISA, NSA, FBI, and MS-ISAC Release Phishing Prevention Guidance

October 18, 2023

Siemens Mendix Studio Pro | CISA

June 17, 2025

NSA, CISA, FBI, and International Partners Release Cybersecurity Advisory on “Fast Flux,” a National Security Threat

April 3, 2025

Advisory Update on Cyber Threat Activity Targeting Commvault’s SaaS Cloud Application (Metallic)

May 22, 2025

Rockwell Automation reported these vulnerabilities to CISA.

4. MITIGATIONS

Rockwell Automation has released the following versions to fix these vulnerabilities and can be addressed by performing a standard firmware update. Customers are strongly encouraged to implement the risk mitigations provided below and to the extent possible, to combine these with the security best practices to employ multiple strategies simultaneously.

  • 1756-EN2T Series A, B, and C: Update to 5.029 or later signed versions (**recommended). Update to 5.009 for unsigned versions
  • 1756-EN2T Series D: Update to 11.004 or later
  • 1756-EN2TK Series A, B, and C: Update to 5.029 or later signed versions (**recommended). Update to 5.009 for unsigned versions
  • 1756-EN2TK Series D: Update to 11.004 or later
  • 1756-EN2TXT Series A, B, and C: Update to 5.029 or later signed versions (**recommended). Update to 5.009 for unsigned versions
  • 1756-EN2TXT Series D: Update to 11.004 or later
  • 1756-EN2TP Series A: Update to 11.004 or later
  • 1756-EN2TPK Series A: Update to 11.004 or later
  • 1756-EN2TPXT Series A: Update to 11.004 or later
  • 1756-EN2TR Series A and B: Update to 5.029 or later for signed versions (**recommended). Update to 5.009 for unsigned versions
  • 1756-EN2TR Series C: Update to 11.004 or later
  • 1756-EN2TRK Series A and B: Update to 5.029 or later for signed versions (**recommended). Update to 5.009 for unsigned versions
  • 1756-EN2TRK Series C: Update to 11.004 or later
  • 1756-EN2TRXT Series A and B: Update to 5.029 or later for signed versions (**recommended). Update to 5.009 for unsigned versions
  • 1756-EN2TRXT Series C: Update to 11.004 or later
  • 1756-EN2F Series A and B: Update to 5.029 or later for signed versions (**recommended). Update to 5.009 for unsigned versions
  • 1756-EN2F Series C: Update to 11.004 or later
  • 1756-EN2FK Series A and B: Update to 5.029 or later for signed versions (**recommended). Update to 5.009 for unsigned versions
  • 1756-EN2FK Series C: Update to 11.004 or later
  • 1756-EN3TR Series A: Update to 5.029 or later for signed versions (**recommended). Update to 5.009 for unsigned versions
  • 1756-EN3TR Series B: Update to 11.004 or later
  • 1756-EN3TRK Series A: Update to 5.029 or later for signed versions (**recommended). Update to 5.009 for unsigned versions
  • 1756-EN3TRK Series B: Update to 11.004 or later
  • 1756-EN4TR Series A: Update to 5.002 or later
  • 1756-EN4TRK Series A: Update to 5.002 or later
  • 1756-EN4TRXT Series A: Update to 5.002 or later

** Rockwell Automation strongly recommends updating to signed firmware if possible. Once the module is updated to signed firmware (example 5.008 to 5.0029), it is not possible to revert to unsigned firmware versions.

Organizations should take the following actions to further secure ControlLogix communications modules from exploitation:

  • Update firmware. Update EN2* ControlLogix communications modules to firmware revision 11.004 and update EN4* ControlLogix communications modules to firmware revision 5.002. New firmware updates could also become available for other ControlLogix communication modules and organizations should update firmware as these updates become available.

  • Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks.

  • Implement detection signatures. Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.

For more information and to see Rockwell’s detection rules, see Rockwell Automation’s Security Advisory.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploits specifically target these vulnerabilities.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

CISA and FBI Release Cybersecurity Advisory on Enhanced Monitoring to Detect APT Activity Targeting Outlook Online
CISA Releases One Industrial Control Systems Advisory
Related posts
  • Related posts
  • More from author
Threat Advisories

CISA Adds Two Known Exploited Vulnerabilities to Catalog

March 13, 20260
Threat Advisories

Siemens SIDIS Prime | CISA

March 12, 20260

Siemens RUGGEDCOM APE1808 Devices | CISA

March 12, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity – Information System Security Manager (ISSM)

March 15, 20260
Careers

Sr. Cybersecurity Engineer Security Controls Assessor Representative

March 15, 20260
Careers

Consultant, Cybersecurity

March 15, 20260
Careers

Senior Cybersecurity Manager

March 15, 20260
Careers

Senior Cybersecurity Analyst

March 15, 20260
Careers

Space Intelligence and Weapon Systems Classified Cybersecurity Operations Senior Manager

March 15, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity – Information System Security Manager (ISSM)
  • Sr. Cybersecurity Engineer Security Controls Assessor Representative
  • Consultant, Cybersecurity
  • Senior Cybersecurity Manager
  • Senior Cybersecurity Analyst

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures