CVE-2024-6436

An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rockwellautomation:sequencemanager:*:*:*:*:*:*:*:*

History

22 Oct 2025, 20:29

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Rockwellautomation sequencemanager
Rockwellautomation
References () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1679.html - () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1679.html - Vendor Advisory
CPE cpe:2.3:a:rockwellautomation:sequencemanager:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

Information

Published : 2024-09-27 20:15

Updated : 2025-10-22 20:29


NVD link : CVE-2024-6436

Mitre link : CVE-2024-6436

CVE.ORG link : CVE-2024-6436


JSON object : View

Products Affected

rockwellautomation

  • sequencemanager
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo