Rockwell Automation Select Communication Modules
A buffer overflow vulnerability (CWE-787) in Rockwell Automation Select Communication Modules allows unauthenticated remote attackers to gain access to and modify the running memory of the module. The vulnerability exists in multiple EN2, EN3, and EN4 series Ethernet communication modules with firmware versions up to 5.028 (Series A/B/C) and 11.003 (Series D variants), and 5.001 (EN4 series). Exploitation requires only network connectivity to the module and no valid credentials, allowing an attacker to read sensitive data, inject malicious commands, or disrupt control system communication.
- Network access to the communication module on its management or data port (port 2222 or configured Ethernet port)
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7d53484c-2cde-46ee-b664-07fb00132a0bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.