1. EXECUTIVE SUMMARY
- CVSS v4 8.7
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Rockwell Automation
- Equipment: CompactLogix 5380, ControlLogix 5580, GuardLogix 5580, Compact GuardLogix 5380, CompactLogix 5480
- Vulnerability: Improper Input Validation
2. RISK EVALUATION
Successful exploitation of this vulnerability could crash the device being accessed.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following Rockwell Automation products are affected:
- CompactLogix 5380 (5069 – L3z): Versions prior to v36.011, v35.013, v34.014
- CompactLogix 5480 (5069 – L4): Versions prior to v36.011, v35.013, v34.014
- ControlLogix 5580 (1756 – L8z): Versions prior to v36.011, v35.013, v34.014
- GuardLogix 5580 (1756 – L8z): Versions prior to v36.011, v35.013, v34.014
- Compact GuardLogix 5380 (5069 – L3zS2): Versions prior to v36.011, v35.013, v34.014
3.2 Vulnerability Overview
3.2.1 Improper Input Validation CWE-20
A denial-of-service vulnerability exists in the affected products. A malformed PTP management packet can cause a major nonrecoverable fault in the controller.
CVE-2024-7515 has been assigned to this vulnerability. A CVSS v3.1 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
A CVSS v4 score has also been calculated for CVE-2024-7515. A base score of 8.7 has been calculated; the CVSS vector string is (CVSS4.0/AV:N/AC:L/AT:N/PR
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: