Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2019-13524
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
GE PACSystems RX3i CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU/320 All versions(End of Life) may allow an attacker sending specially manipulated packets to cause the module state to change to halt-mode, resulting in a denial-of-service condition. An operator must reboot the CPU module after removing battery or energy pack to recover from halt-mode.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款GE产品输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GE PACSystems RX3i CPE100和GE CPE302都是美国通用电气(GE)公司的产品。GE PACSystems RX3i CPE100是一款工业互联网控制器。GE CPE302是一款互联网工业控制器。 多款GE产品中存在输入验证错误漏洞。攻击者可通过发送特制的数据包利用该漏洞导致模块状态更改为暂停模式,进而造成拒绝服务。以下产品及版本受到影响:GE PACSystems RX3i CPE100 R9.85之前版本;CPE115 115R9.85之前版本;CPE302 R9.90之前版
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-GE PACSystems RX3i CPE100/115: All versions prior to R9.85,CPE302/305/310/330/400/410: All versions prior to R9.90,CRU320 All versions(End of Life) -
II. Public POCs for CVE-2019-13524
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2019-13524
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2019-13524

No comments yet


Leave a comment