Elipse SCADA DNP3 Denial of Service
A denial of service vulnerability exists in the Elipse SCADA DNP3 driver and related products (Elipse E3, Elipse Power systems, DNP 3.0 Master). The flaw allows a remote attacker to send a specially crafted DNP3 protocol message that is not properly validated by the application, causing an unhandled exception and crash. This results in loss of communication between the SCADA master and downstream RTUs/PLCs, disrupting real-time monitoring and control operations. The vulnerability affects all versions of Elipse SCADA with DNP3 driver up to 2.29_build_141, Elipse E3 versions 1.0 through 4.5, Elipse Power systems versions 1.0 through 4.5, and DNP 3.0 Master up to version 3.02. No patch has been made available by the vendor.
- Network access to DNP3 port (typically TCP/UDP 20000)
- Elipse SCADA application or DNP3 Master running on the target host
- DNP3 driver enabled
/api/v1/advisories/f38cfb9e-5b57-480f-8054-95f71243a182Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.