1. EXECUTIVE SUMMARY
- CVSS v4 8.7
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Rockwell Automation
- Equipment: ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix 5380, CompactLogix 5480, 1756-EN4
- Vulnerability: Improper Input Validation
2. RISK EVALUATION
Successful exploitation of this vulnerability may cause the device to become unavailable and require a factory reset to recover.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Rockwell Automation reports that the following controllers are affected:
- CompactLogix 5380: v.32 .011
- CompactLogix 5380 Process: v.33.011
- Compact GuardLogix 5380 SIL 2: v.32.013
- Compact GuardLogix 5380 SIL 3: v.32.011
- CompactLogix 5480: v.32.011
- ControlLogix 5580: v.32.011
- ControlLogix 5580 Process: v.33.011
- GuardLogix 5580: v.32.011
- 1756-EN4: v2.001
3.2 Vulnerability Overview
3.2.1 Improper Input Validation CWE-20
A denial-of-service vulnerability exists in the affected products when specially crafted packets are sent to the CIP security object. If exploited, the device will become unavailable and require a factory reset to recover.
CVE-2024-6077 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
A CVSS v4 score has also been calculated for CVE-2024-6077. A base score of 8.7 has been calculated; the CVSS vector string is ([…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: