Rockwell Automation Select Distributed I/O Communication Modules
A denial-of-service vulnerability exists in Rockwell Automation distributed I/O communication modules due to improper input validation (CWE-787 out-of-bounds write). An unauthenticated attacker on the network can send a specially crafted packet to cause the module to crash and stop responding. The vulnerability affects 1734-AENT/AENTR, 1738-AENT/AENTR, 1794-AENTR, 1732E series, and 1799ER-IQ10XOQ10 modules used in CompactLogix and ControlLogix systems. Successful exploitation results in loss of communication with field devices connected through the affected module, disrupting sensor data acquisition and control commands until the module is manually restarted.
- Network access to the I/O module's EtherNet/IP or Modbus TCP port
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/38fc6cd9-7b64-438b-81ca-ad034b76770aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.