Vulnerabilites related to rockwellautomation - 1756-en4_firmware
Vulnerability from fkie_nvd
Published
2024-06-14 17:15
Modified
2025-02-27 15:15
Severity ?
Summary
Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the same network to result in a major nonrecoverable fault(MNRF/Assert). This vulnerability could be exploited by sending abnormal packets to the mDNS port. If exploited, the availability of the device would be compromised.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:34.011:*:*:*:*:*:*:*", matchCriteriaId: "02F74A5B-BE74-4F8B-B8D3-D1D48A6C5CA0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:34.011:*:*:*:*:*:*:*", matchCriteriaId: "D8B88DDE-9002-4EE8-BAA8-73330CB0BE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "006B7683-9FDF-4748-BA28-2EA22613E092", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:1756-en4_firmware:4.001:*:*:*:*:*:*:*", matchCriteriaId: "3B050175-3923-4B1E-AE98-53AF028EE8AA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:1756-en4:-:*:*:*:*:*:*:*", matchCriteriaId: "6935642C-4CBF-4B4F-A509-561B3E39A66B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:34.011:*:*:*:*:*:*:*", matchCriteriaId: "EC388DFC-DA67-44B6-AE97-731B33F38992", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*", matchCriteriaId: "EDD040ED-B44C-47D0-B4D4-729C378C4F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:34.011:*:*:*:*:*:*:*", matchCriteriaId: "01EB5C9E-A10F-4D53-AF3D-38055F966BD6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*", matchCriteriaId: "62414E65-73C7-4172-B7BF-F40A66AFBB90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:34.011:*:*:*:*:*:*:*", matchCriteriaId: "A913AF0F-DA08-4FE9-9E94-AA1D6227981B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", matchCriteriaId: "80F4F5BE-07DF-402A-BF98-34FBA6A11968", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the same network to result in a major nonrecoverable fault(MNRF/Assert). This vulnerability could be exploited by sending abnormal packets to the mDNS port. If exploited, the availability of the device would be compromised.", }, { lang: "es", value: "Rockwell Automation fue informado de una vulnerabilidad que hace que todos los controladores afectados en la misma red produzcan una falla importante no recuperable (MNRF/Assert). Esta vulnerabilidad podría explotarse enviando paquetes anormales al puerto mDNS. Si se explota, la disponibilidad del dispositivo se vería comprometida.", }, ], id: "CVE-2024-5659", lastModified: "2025-02-27T15:15:08.350", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], cvssMetricV40: [ { cvssData: { Automatable: "NOT_DEFINED", Recovery: "NOT_DEFINED", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "ADJACENT", availabilityRequirement: "NOT_DEFINED", baseScore: 8.3, baseSeverity: "HIGH", confidentialityRequirement: "NOT_DEFINED", exploitMaturity: "NOT_DEFINED", integrityRequirement: "NOT_DEFINED", modifiedAttackComplexity: "NOT_DEFINED", modifiedAttackRequirements: "NOT_DEFINED", modifiedAttackVector: "NOT_DEFINED", modifiedPrivilegesRequired: "NOT_DEFINED", modifiedSubAvailabilityImpact: "NOT_DEFINED", modifiedSubConfidentialityImpact: "NOT_DEFINED", modifiedSubIntegrityImpact: "NOT_DEFINED", modifiedUserInteraction: "NOT_DEFINED", modifiedVulnAvailabilityImpact: "NOT_DEFINED", modifiedVulnConfidentialityImpact: "NOT_DEFINED", modifiedVulnIntegrityImpact: "NOT_DEFINED", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "HIGH", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "NOT_DEFINED", }, source: "PSIRT@rockwellautomation.com", type: "Secondary", }, ], }, published: "2024-06-14T17:15:51.600", references: [ { source: "PSIRT@rockwellautomation.com", tags: [ "Vendor Advisory", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1673.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1673.html", }, ], sourceIdentifier: "PSIRT@rockwellautomation.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-670", }, ], source: "PSIRT@rockwellautomation.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-670", }, ], source: "nvd@nist.gov", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 20:15
Modified
2024-09-19 14:31
Severity ?
Summary
A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:32.011:*:*:*:*:*:*:*", matchCriteriaId: "D389E07F-A04E-467A-8FE4-4DE8B69EF7EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*", matchCriteriaId: "EDD040ED-B44C-47D0-B4D4-729C378C4F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:32.013:*:*:*:*:*:*:*", matchCriteriaId: "CCF40770-68D8-41E8-B0DC-61BEFD2DA987", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_2:-:*:*:*:*:*:*:*", matchCriteriaId: "E594CDF6-0582-4D5C-B6AA-C8A2E752E29F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:32.011:*:*:*:*:*:*:*", matchCriteriaId: "7F2345A8-E3BD-45C2-AEE8-189C81D6C23F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_3:-:*:*:*:*:*:*:*", matchCriteriaId: "B82D842C-0930-41AA-83CD-5F235771AE4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:32.011:*:*:*:*:*:*:*", matchCriteriaId: "D7EB2F5A-34D4-49C6-9B58-632DFA6B69E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", matchCriteriaId: "80F4F5BE-07DF-402A-BF98-34FBA6A11968", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:33.011:*:*:*:*:*:*:*", matchCriteriaId: "F032C078-D896-47EC-8393-10803E832C18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:32.011:*:*:*:*:*:*:*", matchCriteriaId: "BAE872BB-FC1F-4B70-92AD-B1213A347C89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "006B7683-9FDF-4748-BA28-2EA22613E092", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:1756-en4_firmware:2.001:*:*:*:*:*:*:*", matchCriteriaId: "B389BA8B-56CD-4614-BC77-02FC80981FA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:1756-en4:-:*:*:*:*:*:*:*", matchCriteriaId: "6935642C-4CBF-4B4F-A509-561B3E39A66B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.", }, { lang: "es", value: "Existe una vulnerabilidad de denegación de servicio en los productos afectados de Rockwell Automation cuando se envían paquetes especialmente manipulados al objeto de seguridad CIP. Si se explota, el dispositivo dejará de estar disponible y será necesario restablecer la configuración de fábrica para recuperarse.", }, ], id: "CVE-2024-6077", lastModified: "2024-09-19T14:31:18.463", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], cvssMetricV40: [ { cvssData: { Automatable: "NOT_DEFINED", Recovery: "NOT_DEFINED", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", availabilityRequirement: "NOT_DEFINED", baseScore: 8.7, baseSeverity: "HIGH", confidentialityRequirement: "NOT_DEFINED", exploitMaturity: "NOT_DEFINED", integrityRequirement: "NOT_DEFINED", modifiedAttackComplexity: "NOT_DEFINED", modifiedAttackRequirements: "NOT_DEFINED", modifiedAttackVector: "NOT_DEFINED", modifiedPrivilegesRequired: "NOT_DEFINED", modifiedSubAvailabilityImpact: "NOT_DEFINED", modifiedSubConfidentialityImpact: "NOT_DEFINED", modifiedSubIntegrityImpact: "NOT_DEFINED", modifiedUserInteraction: "NOT_DEFINED", modifiedVulnAvailabilityImpact: "NOT_DEFINED", modifiedVulnConfidentialityImpact: "NOT_DEFINED", modifiedVulnIntegrityImpact: "NOT_DEFINED", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "NONE", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "NOT_DEFINED", }, source: "PSIRT@rockwellautomation.com", type: "Secondary", }, ], }, published: "2024-09-12T20:15:05.440", references: [ { source: "PSIRT@rockwellautomation.com", tags: [ "Vendor Advisory", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1963.html", }, ], sourceIdentifier: "PSIRT@rockwellautomation.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "PSIRT@rockwellautomation.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2024-6077
Vulnerability from cvelistv5
Published
2024-09-12 19:59
Modified
2024-09-12 21:01
Severity ?
EPSS score ?
Summary
A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Rockwell Automation | CompactLogix 5380 |
Version: v.32 .011 |
|||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "compactlogix_5480_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "33.017", status: "affected", version: "32 .011", versionType: "custom", }, { lessThan: "34.014", status: "affected", version: "34.0", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5380_process_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "compactlogix_5380_process_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "33.017", status: "affected", version: "33.011", versionType: "custom", }, { lessThan: "34.014", status: "affected", version: "34.0", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil2_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "compact_guardlogix_5380_sil2_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "33.017", status: "affected", version: "32.013", versionType: "custom", }, { lessThan: "34.014", status: "affected", version: "34.0", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:1756-en4_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "1756-en4_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "6.001", status: "affected", version: "2.001", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-6077", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T20:22:58.224200Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T21:01:50.254Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "CompactLogix 5380", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32 .011", }, ], }, { defaultStatus: "unaffected", product: "CompactLogix 5380 Process", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.33.011", }, ], }, { defaultStatus: "unaffected", product: "Compact GuardLogix 5380 SIL 2", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32.013", }, ], }, { defaultStatus: "unaffected", product: "Compact GuardLogix 5380 SIL 3", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32.011", }, ], }, { defaultStatus: "unaffected", product: "CompactLogix 5480", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32.011", }, ], }, { defaultStatus: "unaffected", product: "ControlLogix® 5580", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32.011", }, ], }, { defaultStatus: "unaffected", product: "ControlLogix® 5580 Process", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.33.011", }, ], }, { defaultStatus: "unaffected", product: "GuardLogix 5580", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32.011", }, ], }, { defaultStatus: "unaffected", product: "1756-EN4", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v2.001", }, ], }, ], datePublic: "2024-09-12T13:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover. </span>", }, ], value: "A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.", }, ], impacts: [ { capecId: "CAPEC-153", descriptions: [ { lang: "en", value: "CAPEC-153 Input Data Manipulation", }, ], }, ], metrics: [ { cvssV4_0: { Automatable: "NOT_DEFINED", Recovery: "NOT_DEFINED", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", baseScore: 8.7, baseSeverity: "HIGH", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "NONE", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "NOT_DEFINED", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T20:07:19.806Z", orgId: "b73dd486-f505-4403-b634-40b078b177f0", shortName: "Rockwell", }, references: [ { url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1963.html", }, ], solutions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<table><tbody><tr><td><p>Affected Family </p><p> </p><p> </p></td><td><p> </p><p> </p><p>First Known in Software/Firmware Version</p><p> </p><p> </p></td><td><p> </p><p> </p><p>Corrected in Software/Firmware Version</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>CompactLogix 5380</p><p> </p><p> </p><p> </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32 .011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>CompactLogix 5380 Process </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.33.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>Compact GuardLogix 5380 SIL 2 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.013</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>Compact GuardLogix 5380 SIL 3 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>CompactLogix 5480 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>ControlLogix® 5580 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>ControlLogix® 5580 Process </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.33.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>GuardLogix 5580 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>1756-EN4</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v2.001</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v6.001 and later</p><p> </p><p> </p></td></tr></tbody></table><p> </p>\n\n\n\n<p>Mitigations and Workarounds <br>Customers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. </p><ul><li><p>Users who do not wish to use CIP security can disable the feature per device. See \"Disable CIP Security\" in Chapter 2 of \"CIP Security with Rockwell Automation Products\" (publication SECURE-AT001)</p></li></ul><p>For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested <a target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\">security best practices</a> to minimize the risk of the vulnerability. Customers can use <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc\">Stakeholder-Specific Vulnerability Categorization</a> to generate more environment-specific prioritization.</p>\n\n<br>", }, ], value: "Affected Family \n\n \n\n \n\n \n\n \n\nFirst Known in Software/Firmware Version\n\n \n\n \n\n \n\n \n\nCorrected in Software/Firmware Version\n\n \n\n \n\n \n\n \n\nCompactLogix 5380\n\n \n\n \n\n \n\n \n\n \n\n \n\n \n\nv.32 .011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompactLogix 5380 Process \n\n \n\n \n\n \n\n \n\nv.33.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompact GuardLogix 5380 SIL 2 \n\n \n\n \n\n \n\n \n\nv.32.013\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompact GuardLogix 5380 SIL 3 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompactLogix 5480 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nControlLogix® 5580 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nControlLogix® 5580 Process \n\n \n\n \n\n \n\n \n\nv.33.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nGuardLogix 5580 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\n1756-EN4\n\n \n\n \n\n \n\n \n\nv2.001\n\n \n\n \n\n \n\n \n\nv6.001 and later\n\n \n\n \n\n \n\n\n\n\n\nMitigations and Workarounds \nCustomers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. \n\n * Users who do not wish to use CIP security can disable the feature per device. See \"Disable CIP Security\" in Chapter 2 of \"CIP Security with Rockwell Automation Products\" (publication SECURE-AT001)\n\n\n\n\nFor information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight to minimize the risk of the vulnerability. Customers can use Stakeholder-Specific Vulnerability Categorization https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc to generate more environment-specific prioritization.", }, ], source: { advisory: "SD1963", discovery: "INTERNAL", }, title: "Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix® 5380 Vulnerable to DoS vulnerability via CIP", x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "b73dd486-f505-4403-b634-40b078b177f0", assignerShortName: "Rockwell", cveId: "CVE-2024-6077", datePublished: "2024-09-12T19:59:40.368Z", dateReserved: "2024-06-17T16:21:32.155Z", dateUpdated: "2024-09-12T21:01:50.254Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }