1. EXECUTIVE SUMMARY
- CVSS v4 8.7
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Rockwell Automation
- Equipment: ControlLogix, GuardLogix 5580, CompactLogix, Compact GuardLogix 5380
- Vulnerability: Improper Input Validation
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow and attacker to cause a denial-of-service condition.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following Rockwell Automation products are affected:
- CompactLogix 5380 (5069 – L3z): Versions prior to v36.011, v35.013, v34.014
- CompactLogix 5480 (5069 – L4): Versions prior to v36.011, v35.013, v34.014
- ControlLogix 5580 (1756 – L8z): Versions prior to v36.011, v35.013, v34.014
- GuardLogix 5580 (1756 – L8z): Versions prior to v36.011, v35.013, v34.014
- Compact GuardLogix 5380 (5069 – L3zS2): Versions prior to v36.011, v35.013, v34.014
3.2 Vulnerability Overview
3.2.1 IMPROPER INPUT VALIDATION CWE-20
A denial-of-service vulnerability exists in the affected products. This vulnerability occurs when a malformed PCCC message is received, causing a fault in the controller.
CVE-2024-7507 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
A CVSS v4 score has also been calculated for CVE-2024-7507. A base score of 8.7 has been calculated; the CVSS vector string is (CVSS4.0/AV:N/AC:
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: