An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.
References
Link | Resource |
---|---|
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1679.html | Vendor Advisory |
Configurations
History
22 Oct 2025, 20:29
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Rockwellautomation sequencemanager
Rockwellautomation |
|
References | () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1679.html - Vendor Advisory | |
CPE | cpe:2.3:a:rockwellautomation:sequencemanager:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
Information
Published : 2024-09-27 20:15
Updated : 2025-10-22 20:29
NVD link : CVE-2024-6436
Mitre link : CVE-2024-6436
CVE.ORG link : CVE-2024-6436
JSON object : View
Products Affected
rockwellautomation
- sequencemanager
CWE