Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix 5380

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 8.7
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Rockwell Automation
  • Equipment: ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix 5380, CompactLogix 5480, 1756-EN4
  • Vulnerability: Improper Input Validation

2. RISK EVALUATION

Successful exploitation of this vulnerability may cause the device to become unavailable and require a factory reset to recover.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Rockwell Automation reports that the following controllers are affected:

  • CompactLogix 5380: v.32 .011
  • CompactLogix 5380 Process: v.33.011
  • Compact GuardLogix 5380 SIL 2: v.32.013
  • Compact GuardLogix 5380 SIL 3: v.32.011
  • CompactLogix 5480: v.32.011
  • ControlLogix 5580: v.32.011
  • ControlLogix 5580 Process: v.33.011
  • GuardLogix 5580: v.32.011
  • 1756-EN4: v2.001

3.2 Vulnerability Overview

3.2.1 Improper Input Validation CWE-20

A denial-of-service vulnerability exists in the affected products when specially crafted packets are sent to the CIP security object. If exploited, the device will become unavailable and require a factory reset to recover.

CVE-2024-6077 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

A CVSS v4 score has also been calculated for CVE-2024-6077. A base score of 8.7 has been calculated; the CVSS vector string is ([…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from All CISA Advisories

Read the original article: