All the vulnerabilites related to Rockwell Automation - FactoryTalk® Logix Echo
cve-2024-6207
Vulnerability from cvelistv5
Published
2024-10-14 20:53
Modified
2024-10-15 14:43
Severity ?
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS score ?
Summary
CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "compactlogix_5380_firmware", "vendor": "rockwellautomation", "versions": [ { "lessThan": "33.017", "status": "affected", "version": "28.011", "versionType": "custom" }, { "lessThan": "34.014", "status": "affected", "version": "34.0", "versionType": "custom" }, { "lessThan": "35.013", "status": "affected", "version": "35.0", "versionType": "custom" }, { "lessThan": "36.011", "status": "affected", "version": "36.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "controllogix_5580_process_firmware", "vendor": "rockwellautomation", "versions": [ { "lessThan": "33.017", "status": "affected", "version": "33.011", "versionType": "custom" }, { "lessThan": "34.014", "status": "affected", "version": "34.0", "versionType": "custom" }, { "lessThan": "35.013", "status": "affected", "version": "35.0", "versionType": "custom" }, { "lessThan": "36.011", "status": "affected", "version": "36.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "guardlogix_5580_firmware", "vendor": "rockwellautomation", "versions": [ { "lessThan": "33.017", "status": "affected", "version": "31.011", "versionType": "custom" }, { "lessThan": "34.014", "status": "affected", "version": "34.0", "versionType": "custom" }, { "lessThan": "35.013", "status": "affected", "version": "35.0", "versionType": "custom" }, { "lessThan": "36.011", "status": "affected", "version": "36.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "controllogix_5580_process_firmware", "vendor": "rockwellautomation", "versions": [ { "lessThan": "33.017", "status": "affected", "version": "32.011", "versionType": "custom" }, { "lessThan": "34.014", "status": "affected", "version": "34.0", "versionType": "custom" }, { "lessThan": "35.013", "status": "affected", "version": "35.0", "versionType": "custom" }, { "lessThan": "36.011", "status": "affected", "version": "36.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil3_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "compact_guardlogix_5380_sil3_firmware", "vendor": "rockwellautomation", "versions": [ { "lessThan": "33.017", "status": "affected", "version": "32.013", "versionType": "custom" }, { "lessThan": "34.014", "status": "affected", "version": "34.0", "versionType": "custom" }, { "lessThan": "35.013", "status": "affected", "version": "35.0", "versionType": "custom" }, { "lessThan": "36.011", "status": "affected", "version": "36.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:rockwellautomation:factorytalk_logix_echo:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "factorytalk_logix_echo", "vendor": "rockwellautomation", "versions": [ { "lessThan": "34.014", "status": "affected", "version": "33.011", "versionType": "custom" }, { "lessThan": "35.013", "status": "affected", "version": "35.0", "versionType": "custom" }, { "lessThan": "36.011", "status": "affected", "version": "36.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6207", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T14:11:41.281080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T14:43:19.768Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ControlLogix\u00ae 5580", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "V28.011" } ] }, { "defaultStatus": "unaffected", "product": "ControlLogix\u00ae 5580 Process", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "V33.011" } ] }, { "defaultStatus": "unaffected", "product": "GuardLogix 5580", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "V31.011" } ] }, { "defaultStatus": "unaffected", "product": "CompactLogix 5380", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "V28.011" } ] }, { "defaultStatus": "unaffected", "product": "Compact GuardLogix 5380 SIL 2", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "V31.011" } ] }, { "defaultStatus": "unaffected", "product": "Compact GuardLogix 5380 SIL 3", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "V32.013" } ] }, { "defaultStatus": "unaffected", "product": "CompactLogix 5480", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "V32.011" } ] }, { "defaultStatus": "unaffected", "product": "FactoryTalk\u00ae Logix Echo", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "V33.011" } ] } ], "datePublic": "2024-10-10T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003eCVE-2024-6207\u003c/a\u003e\u0026nbsp;IMPACT\u003c/p\u003e\u003cp\u003eA denial-of-service vulnerability exists in the affected products that will cause the device to result in a major nonrecoverable fault (MNRF) when it receives an invalid CIP request. To exploit this vulnerability a malicious user must chain this exploits with \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html\"\u003eCVE 2021-22681\u003c/a\u003e\u0026nbsp;and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running. \u003c/p\u003e" } ], "value": "CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html \u00a0and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-14T20:53:49.191Z", "orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell" }, "references": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1707.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAFFECTED PRODUCTS AND SOLUTION\u003c/p\u003e\u003ctable\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eAffected Product\u003cbr\u003e\u003c/td\u003e\u003ctd\u003eFirst Known in firmware revision\u003c/td\u003e\u003ctd\u003eCorrected in firmware revision\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eControlLogix\u00ae 5580\u003c/td\u003e\u003ctd\u003eV28.011\u003c/td\u003e\u003ctd\u003eV33.017, V34.014, V35.013, V36.011 and later\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eControlLogix\u00ae 5580 Process\u003c/td\u003e\u003ctd\u003eV33.011\u003c/td\u003e\u003ctd\u003eV33.017, V34.014, V35.013, V36.011 and later\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGuardLogix 5580\u003c/td\u003e\u003ctd\u003eV31.011\u003c/td\u003e\u003ctd\u003e\u0026nbsp;V33.017, V34.014, V35.013, V36.011 and later\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eCompactLogix 5380\u003c/td\u003e\u003ctd\u003eV28.011\u003c/td\u003e\u003ctd\u003e\u0026nbsp;V33.017, V34.014, V35.013, V36.011 and later\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eCompact GuardLogix 5380 SIL 2\u003c/td\u003e\u003ctd\u003eV31.011\u003c/td\u003e\u003ctd\u003eV33.017, V34.014, V35.013, V36.011 and later\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eCompact GuardLogix 5380 SIL 3\u003c/td\u003e\u003ctd\u003eV32.013\u003c/td\u003e\u003ctd\u003eV33.017, V34.014, V35.013, V36.011 and later\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eCompactLogix 5480\u003c/td\u003e\u003ctd\u003eV32.011\u003c/td\u003e\u003ctd\u003eV33.017, V34.014, V35.013, V36.011 and later\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eFactoryTalk\u00ae Logix Echo \u003c/td\u003e\u003ctd\u003eV33.011\u003c/td\u003e\u003ctd\u003eV34.014, V35.013, V36.011 and later\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e\n\n\u003cbr\u003e" } ], "value": "AFFECTED PRODUCTS AND SOLUTION\n\nAffected Product\nFirst Known in firmware revisionCorrected in firmware revisionControlLogix\u00ae 5580V28.011V33.017, V34.014, V35.013, V36.011 and laterControlLogix\u00ae 5580 ProcessV33.011V33.017, V34.014, V35.013, V36.011 and laterGuardLogix 5580V31.011\u00a0V33.017, V34.014, V35.013, V36.011 and laterCompactLogix 5380V28.011\u00a0V33.017, V34.014, V35.013, V36.011 and laterCompact GuardLogix 5380 SIL 2V31.011V33.017, V34.014, V35.013, V36.011 and laterCompact GuardLogix 5380 SIL 3V32.013V33.017, V34.014, V35.013, V36.011 and laterCompactLogix 5480V32.011V33.017, V34.014, V35.013, V36.011 and laterFactoryTalk\u00ae Logix Echo V33.011V34.014, V35.013, V36.011 and later" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "assignerShortName": "Rockwell", "cveId": "CVE-2024-6207", "datePublished": "2024-10-14T20:53:49.191Z", "dateReserved": "2024-06-20T16:08:17.052Z", "dateUpdated": "2024-10-15T14:43:19.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }