- What is the severity of CVE-2023-3596?
- CVE-2023-3596 has been scored as a high severity vulnerability.
- How to fix CVE-2023-3596?
- To fix CVE-2023-3596: * Update firmware. Update EN4* ControlLogix communications modules to firmware revision 5.002. * Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks. * Implement detection signatures. Use appended Snort signatures to monitor and detect anomalous Common Industrial Protocol (CIP) packets to Rockwell Automation devices.
- Is CVE-2023-3596 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2023-3596 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2023-3596?
- CVE-2023-3596 affects Rockwell Automation 1756-EN4TR Series A, Rockwell Automation 1756-EN4TRK Series A, Rockwell Automation 1756-EN4TRXT Series A .