Headline
CVE-2023-38744
Denial-of-service (DoS) vulnerability due to improper validation of specified type of input issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit. If an affected product receives a packet which is specially crafted by a remote unauthenticated attacker, the unit of the affected product may fall into a denial-of-service (DoS) condition. Affected products/versions are as follows: CJ2M CPU Unit CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier, CJ2H CPU Unit CJ2H-CPU6[]-EIP Unit version of the built-in EtherNet/IP section Ver. 3.04 and earlier, CS/CJ Series EtherNet/IP Unit CS1W-EIP21 V3.04 and earlier, and CS/CJ Series EtherNet/IP Unit CJ1W-EIP21 V3.04 and earlier.
%PDF-1.7 %���� 368 0 obj <> endobj 387 0 obj <>/Encrypt 369 0 R/Filter/FlateDecode/ID[<33CD3E0D978B8C4085978F3356D7470F><577ED0C9095CEE4D88D3398D50D6395C>]/Index[368 45]/Info 367 0 R/Length 95/Prev 246147/Root 370 0 R/Size 413/Type/XRef/W[1 3 1]>>stream h�bbd```b``z"o��; �A,>D�n���Hv$rX�D2�lG�2�I�� ���� ��W301202�ma`�Ɖ/� d endstream endobj startxref 0 %%EOF 412 0 obj <>stream GDe��&��:�p�̘ϥ9��#b����x�V+�*���p-�B(k�� �ڲ67��)�-+��K�<._�w���l�ܽ<���,�aw��Q���`� e���\v� ���8���TU��ݼ���0��~A����Nb�B:L����������v endstream endobj 369 0 obj <>>>/Filter/Standard/Length 128/O(��������Q�Ro,�\)�C��19+���J)/P -1324/R 4/StmF/StdCF/StrF/StdCF/U(�PW�9Q+\)���k��r)/V 4>> endobj 370 0 obj <>/Metadata 13 0 R/OpenAction 371 0 R/PageLayout/SinglePage/Pages 366 0 R/StructTreeRoot 27 0 R/Type/Catalog/ViewerPreferences 388 0 R>> endobj 371 0 obj <> endobj 372 0 obj <>/MediaBox[0 0 595.32 841.92]/Parent 366 0 R/Resources<>/Font<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/StructParents 0/Tabs/S/Type/Page>> endobj 373 0 obj <>stream �U�-������99�`�X4Br�`�Њ N��)y����s`�e"���I�ߧxs$B ��V����M�(�Mla�iO���PGC��c��/�WO�X�&AǏ�ȯ�{9�e� �څ 4�N�ޚ�/7�.�ȿh���gԅ�]U���������X*’’9�1"vV#�*��]�ɨ�*� y���9�����Mf