Vulnerabilites related to rockwellautomation - compact_guardlogix_5380_sil_2
cve-2024-7507
Vulnerability from cvelistv5
Published
2024-08-14 19:35
Modified
2024-08-15 14:37
Severity ?
EPSS score ?
Summary
CVE-2024-7507 IMPACT
A denial-of-service vulnerability exists in the affected products. This vulnerability occurs when a malformed PCCC message is received, causing a fault in the controller.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Rockwell Automation | CompactLogix 5380 (5069 – L3z) |
Version: 28.011 |
|||||||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:rockwellautomation:controllogix_5380_firmware:28.011:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "controllogix_5380_firmware", vendor: "rockwellautomation", versions: [ { status: "affected", version: "28.011", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:28.011:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "controllogix_5580_firmware", vendor: "rockwellautomation", versions: [ { status: "affected", version: "28.011", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:28.011:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "guardlogix_5580_firmware", vendor: "rockwellautomation", versions: [ { status: "affected", version: "28.011", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:28.011:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "compact_guardlogix_5380_firmware", vendor: "rockwellautomation", versions: [ { status: "affected", version: "28.011", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:28.011:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "compactlogix_5480_firmware", vendor: "rockwellautomation", versions: [ { status: "affected", version: "28.011", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-7507", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-15T14:32:59.595579Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-15T14:37:58.421Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "CompactLogix 5380 (5069 – L3z)", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "28.011", }, ], }, { defaultStatus: "unaffected", product: "ControlLogix® 5580 (1756 –L8z)", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "28.011", }, ], }, { defaultStatus: "unaffected", product: "GuardLogix 5580 (1756-L8z)", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "28.011", }, ], }, { defaultStatus: "unaffected", product: "Compact GuardLogix 5380 (5069- L3zS2)", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "28.011", }, ], }, { defaultStatus: "unaffected", product: "CompactLogix 5480 (5069-L4)", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "28.011", }, ], }, ], datePublic: "2024-08-13T13:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p><b><u>CVE-2024-7507 IMPACT</u></b></p><p>A denial-of-service vulnerability exists in the affected products. This vulnerability occurs when a malformed PCCC message is received, causing a fault in the controller.</p>", }, ], value: "CVE-2024-7507 IMPACT\n\nA denial-of-service vulnerability exists in the affected products. This vulnerability occurs when a malformed PCCC message is received, causing a fault in the controller.", }, ], impacts: [ { capecId: "CAPEC-153", descriptions: [ { lang: "en", value: "CAPEC-153 Input Data Manipulation", }, ], }, ], metrics: [ { cvssV4_0: { Automatable: "NOT_DEFINED", Recovery: "NOT_DEFINED", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", baseScore: 8.7, baseSeverity: "HIGH", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "NONE", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "NOT_DEFINED", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-14T19:35:55.326Z", orgId: "b73dd486-f505-4403-b634-40b078b177f0", shortName: "Rockwell", }, references: [ { url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201685.html", }, ], solutions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>Upgrade to: \n\n<span style=\"background-color: rgb(255, 255, 255);\">v36.011, v35.013, v34.014 </span><span style=\"background-color: rgb(255, 255, 255);\"><br>\n\n<br></span></p>", }, ], value: "Upgrade to: \n\nv36.011, v35.013, v34.014", }, ], source: { discovery: "INTERNAL", }, title: "Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix® 5380 Controller Denial-of-Service Vulnerability via Input Validation", workarounds: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Restrict communication to CIP object 103 (0x67)</span>\n\n<br>", }, ], value: "Restrict communication to CIP object 103 (0x67)", }, ], x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "b73dd486-f505-4403-b634-40b078b177f0", assignerShortName: "Rockwell", cveId: "CVE-2024-7507", datePublished: "2024-08-14T19:35:55.326Z", dateReserved: "2024-08-05T20:04:40.970Z", dateUpdated: "2024-08-15T14:37:58.421Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-6207
Vulnerability from cvelistv5
Published
2024-10-14 20:53
Modified
2024-10-15 14:43
Severity ?
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS score ?
Summary
CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Rockwell Automation | ControlLogix® 5580 |
Version: V28.011 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "compactlogix_5380_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "33.017", status: "affected", version: "28.011", versionType: "custom", }, { lessThan: "34.014", status: "affected", version: "34.0", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "controllogix_5580_process_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "33.017", status: "affected", version: "33.011", versionType: "custom", }, { lessThan: "34.014", status: "affected", version: "34.0", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "guardlogix_5580_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "33.017", status: "affected", version: "31.011", versionType: "custom", }, { lessThan: "34.014", status: "affected", version: "34.0", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "controllogix_5580_process_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "33.017", status: "affected", version: "32.011", versionType: "custom", }, { lessThan: "34.014", status: "affected", version: "34.0", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil3_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "compact_guardlogix_5380_sil3_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "33.017", status: "affected", version: "32.013", versionType: "custom", }, { lessThan: "34.014", status: "affected", version: "34.0", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:rockwellautomation:factorytalk_logix_echo:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "factorytalk_logix_echo", vendor: "rockwellautomation", versions: [ { lessThan: "34.014", status: "affected", version: "33.011", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-6207", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-15T14:11:41.281080Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-15T14:43:19.768Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "ControlLogix® 5580", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "V28.011", }, ], }, { defaultStatus: "unaffected", product: "ControlLogix® 5580 Process", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "V33.011", }, ], }, { defaultStatus: "unaffected", product: "GuardLogix 5580", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "V31.011", }, ], }, { defaultStatus: "unaffected", product: "CompactLogix 5380", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "V28.011", }, ], }, { defaultStatus: "unaffected", product: "Compact GuardLogix 5380 SIL 2", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "V31.011", }, ], }, { defaultStatus: "unaffected", product: "Compact GuardLogix 5380 SIL 3", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "V32.013", }, ], }, { defaultStatus: "unaffected", product: "CompactLogix 5480", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "V32.011", }, ], }, { defaultStatus: "unaffected", product: "FactoryTalk® Logix Echo", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "V33.011", }, ], }, ], datePublic: "2024-10-10T13:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p><a target=\"_blank\" rel=\"nofollow\">CVE-2024-6207</a> IMPACT</p><p>A denial-of-service vulnerability exists in the affected products that will cause the device to result in a major nonrecoverable fault (MNRF) when it receives an invalid CIP request. To exploit this vulnerability a malicious user must chain this exploits with <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html\">CVE 2021-22681</a> and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running. </p>", }, ], value: "CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.", }, ], impacts: [ { capecId: "CAPEC-100", descriptions: [ { lang: "en", value: "CAPEC-100 Overflow Buffers", }, ], }, ], metrics: [ { cvssV4_0: { Automatable: "NOT_DEFINED", Recovery: "NOT_DEFINED", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", baseScore: 8.7, baseSeverity: "HIGH", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "NONE", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "NOT_DEFINED", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-14T20:53:49.191Z", orgId: "b73dd486-f505-4403-b634-40b078b177f0", shortName: "Rockwell", }, references: [ { url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1707.html", }, ], solutions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>AFFECTED PRODUCTS AND SOLUTION</p><table><tbody><tr><td>Affected Product<br></td><td>First Known in firmware revision</td><td>Corrected in firmware revision</td></tr><tr><td>ControlLogix® 5580</td><td>V28.011</td><td>V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>ControlLogix® 5580 Process</td><td>V33.011</td><td>V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>GuardLogix 5580</td><td>V31.011</td><td> V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>CompactLogix 5380</td><td>V28.011</td><td> V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>Compact GuardLogix 5380 SIL 2</td><td>V31.011</td><td>V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>Compact GuardLogix 5380 SIL 3</td><td>V32.013</td><td>V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>CompactLogix 5480</td><td>V32.011</td><td>V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>FactoryTalk® Logix Echo </td><td>V33.011</td><td>V34.014, V35.013, V36.011 and later</td></tr></tbody></table>\n\n<br>", }, ], value: "AFFECTED PRODUCTS AND SOLUTION\n\nAffected Product\nFirst Known in firmware revisionCorrected in firmware revisionControlLogix® 5580V28.011V33.017, V34.014, V35.013, V36.011 and laterControlLogix® 5580 ProcessV33.011V33.017, V34.014, V35.013, V36.011 and laterGuardLogix 5580V31.011 V33.017, V34.014, V35.013, V36.011 and laterCompactLogix 5380V28.011 V33.017, V34.014, V35.013, V36.011 and laterCompact GuardLogix 5380 SIL 2V31.011V33.017, V34.014, V35.013, V36.011 and laterCompact GuardLogix 5380 SIL 3V32.013V33.017, V34.014, V35.013, V36.011 and laterCompactLogix 5480V32.011V33.017, V34.014, V35.013, V36.011 and laterFactoryTalk® Logix Echo V33.011V34.014, V35.013, V36.011 and later", }, ], source: { discovery: "INTERNAL", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "b73dd486-f505-4403-b634-40b078b177f0", assignerShortName: "Rockwell", cveId: "CVE-2024-6207", datePublished: "2024-10-14T20:53:49.191Z", dateReserved: "2024-06-20T16:08:17.052Z", dateUpdated: "2024-10-15T14:43:19.768Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-6077
Vulnerability from cvelistv5
Published
2024-09-12 19:59
Modified
2024-09-12 21:01
Severity ?
EPSS score ?
Summary
A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Rockwell Automation | CompactLogix 5380 |
Version: v.32 .011 |
|||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "compactlogix_5480_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "33.017", status: "affected", version: "32 .011", versionType: "custom", }, { lessThan: "34.014", status: "affected", version: "34.0", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5380_process_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "compactlogix_5380_process_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "33.017", status: "affected", version: "33.011", versionType: "custom", }, { lessThan: "34.014", status: "affected", version: "34.0", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil2_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "compact_guardlogix_5380_sil2_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "33.017", status: "affected", version: "32.013", versionType: "custom", }, { lessThan: "34.014", status: "affected", version: "34.0", versionType: "custom", }, { lessThan: "35.013", status: "affected", version: "35.0", versionType: "custom", }, { lessThan: "36.011", status: "affected", version: "36.0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:1756-en4_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "1756-en4_firmware", vendor: "rockwellautomation", versions: [ { lessThan: "6.001", status: "affected", version: "2.001", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-6077", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-12T20:22:58.224200Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-12T21:01:50.254Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "CompactLogix 5380", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32 .011", }, ], }, { defaultStatus: "unaffected", product: "CompactLogix 5380 Process", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.33.011", }, ], }, { defaultStatus: "unaffected", product: "Compact GuardLogix 5380 SIL 2", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32.013", }, ], }, { defaultStatus: "unaffected", product: "Compact GuardLogix 5380 SIL 3", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32.011", }, ], }, { defaultStatus: "unaffected", product: "CompactLogix 5480", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32.011", }, ], }, { defaultStatus: "unaffected", product: "ControlLogix® 5580", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32.011", }, ], }, { defaultStatus: "unaffected", product: "ControlLogix® 5580 Process", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.33.011", }, ], }, { defaultStatus: "unaffected", product: "GuardLogix 5580", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v.32.011", }, ], }, { defaultStatus: "unaffected", product: "1756-EN4", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "v2.001", }, ], }, ], datePublic: "2024-09-12T13:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover. </span>", }, ], value: "A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.", }, ], impacts: [ { capecId: "CAPEC-153", descriptions: [ { lang: "en", value: "CAPEC-153 Input Data Manipulation", }, ], }, ], metrics: [ { cvssV4_0: { Automatable: "NOT_DEFINED", Recovery: "NOT_DEFINED", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", baseScore: 8.7, baseSeverity: "HIGH", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "NONE", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "NOT_DEFINED", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-12T20:07:19.806Z", orgId: "b73dd486-f505-4403-b634-40b078b177f0", shortName: "Rockwell", }, references: [ { url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1963.html", }, ], solutions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<table><tbody><tr><td><p>Affected Family </p><p> </p><p> </p></td><td><p> </p><p> </p><p>First Known in Software/Firmware Version</p><p> </p><p> </p></td><td><p> </p><p> </p><p>Corrected in Software/Firmware Version</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>CompactLogix 5380</p><p> </p><p> </p><p> </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32 .011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>CompactLogix 5380 Process </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.33.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>Compact GuardLogix 5380 SIL 2 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.013</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>Compact GuardLogix 5380 SIL 3 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>CompactLogix 5480 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>ControlLogix® 5580 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>ControlLogix® 5580 Process </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.33.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>GuardLogix 5580 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>1756-EN4</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v2.001</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v6.001 and later</p><p> </p><p> </p></td></tr></tbody></table><p> </p>\n\n\n\n<p>Mitigations and Workarounds <br>Customers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. </p><ul><li><p>Users who do not wish to use CIP security can disable the feature per device. See \"Disable CIP Security\" in Chapter 2 of \"CIP Security with Rockwell Automation Products\" (publication SECURE-AT001)</p></li></ul><p>For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested <a target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\">security best practices</a> to minimize the risk of the vulnerability. Customers can use <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc\">Stakeholder-Specific Vulnerability Categorization</a> to generate more environment-specific prioritization.</p>\n\n<br>", }, ], value: "Affected Family \n\n \n\n \n\n \n\n \n\nFirst Known in Software/Firmware Version\n\n \n\n \n\n \n\n \n\nCorrected in Software/Firmware Version\n\n \n\n \n\n \n\n \n\nCompactLogix 5380\n\n \n\n \n\n \n\n \n\n \n\n \n\n \n\nv.32 .011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompactLogix 5380 Process \n\n \n\n \n\n \n\n \n\nv.33.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompact GuardLogix 5380 SIL 2 \n\n \n\n \n\n \n\n \n\nv.32.013\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompact GuardLogix 5380 SIL 3 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompactLogix 5480 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nControlLogix® 5580 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nControlLogix® 5580 Process \n\n \n\n \n\n \n\n \n\nv.33.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nGuardLogix 5580 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\n1756-EN4\n\n \n\n \n\n \n\n \n\nv2.001\n\n \n\n \n\n \n\n \n\nv6.001 and later\n\n \n\n \n\n \n\n\n\n\n\nMitigations and Workarounds \nCustomers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. \n\n * Users who do not wish to use CIP security can disable the feature per device. See \"Disable CIP Security\" in Chapter 2 of \"CIP Security with Rockwell Automation Products\" (publication SECURE-AT001)\n\n\n\n\nFor information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight to minimize the risk of the vulnerability. Customers can use Stakeholder-Specific Vulnerability Categorization https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc to generate more environment-specific prioritization.", }, ], source: { advisory: "SD1963", discovery: "INTERNAL", }, title: "Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix® 5380 Vulnerable to DoS vulnerability via CIP", x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "b73dd486-f505-4403-b634-40b078b177f0", assignerShortName: "Rockwell", cveId: "CVE-2024-6077", datePublished: "2024-09-12T19:59:40.368Z", dateReserved: "2024-06-17T16:21:32.155Z", dateUpdated: "2024-09-12T21:01:50.254Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-7515
Vulnerability from cvelistv5
Published
2024-08-14 19:40
Modified
2024-08-14 19:59
Severity ?
EPSS score ?
Summary
CVE-2024-7515 IMPACT
A denial-of-service vulnerability exists in the affected products. A malformed PTP management packet can cause a major nonrecoverable fault in the controller.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Rockwell Automation | CompactLogix 5380 (5069-L3z) |
Version: 28.011 |
|||||||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:v28.011:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "compactlogix_5380_firmware", vendor: "rockwellautomation", versions: [ { status: "affected", version: "v28.011", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:v28.011:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "controllogix_5580_firmware", vendor: "rockwellautomation", versions: [ { status: "affected", version: "v28.011", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:28.011:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "guardlogix_5580_firmware", vendor: "rockwellautomation", versions: [ { status: "affected", version: "28.011", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:28.011:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "compact_guardlogix_5380_firmware", vendor: "rockwellautomation", versions: [ { status: "affected", version: "28.011", }, ], }, { cpes: [ "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:28.011:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "compactlogix_5480_firmware", vendor: "rockwellautomation", versions: [ { status: "affected", version: "28.011", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-7515", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-14T19:54:17.968076Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-14T19:59:57.056Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "CompactLogix 5380 (5069-L3z)", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "28.011", }, ], }, { defaultStatus: "unaffected", product: "ControlLogix® 5580 (1756- L8z)", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "28.011", }, ], }, { defaultStatus: "unaffected", product: "GuardLogix 5580 (1756- L8zS)", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "28.011", }, ], }, { defaultStatus: "unaffected", product: "Compact GuardLogix 5380 (5069 – L3zS2)", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "28.011", }, ], }, { defaultStatus: "unaffected", product: "CompactLogix 5480 (5069-L4)", vendor: "Rockwell Automation", versions: [ { status: "affected", version: "28.011", }, ], }, ], datePublic: "2024-08-13T13:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p><b><u>CVE-2024-7515 IMPACT</u></b></p><p>A denial-of-service vulnerability exists in the affected products. A malformed PTP management packet can cause a major nonrecoverable fault in the controller.</p>", }, ], value: "CVE-2024-7515 IMPACT\n\nA denial-of-service vulnerability exists in the affected products. A malformed PTP management packet can cause a major nonrecoverable fault in the controller.", }, ], impacts: [ { capecId: "CAPEC-153", descriptions: [ { lang: "en", value: "CAPEC-153 Input Data Manipulation", }, ], }, ], metrics: [ { cvssV4_0: { Automatable: "NOT_DEFINED", Recovery: "NOT_DEFINED", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", baseScore: 8.7, baseSeverity: "HIGH", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "NONE", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "NOT_DEFINED", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-14T19:40:20.990Z", orgId: "b73dd486-f505-4403-b634-40b078b177f0", shortName: "Rockwell", }, references: [ { url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201686.html", }, ], solutions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Upgrade to: \n\n<span style=\"background-color: rgb(255, 255, 255);\">v36.011, v35.013, v34.014</span>", }, ], value: "Upgrade to: \n\nv36.011, v35.013, v34.014", }, ], source: { discovery: "INTERNAL", }, title: "Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix® 5380 Controller Denial-of-Service Vulnerability via Input Validation", workarounds: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>If PTP messages are not used, block at the network level, port UDP 319/320</p>", }, ], value: "If PTP messages are not used, block at the network level, port UDP 319/320", }, ], x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "b73dd486-f505-4403-b634-40b078b177f0", assignerShortName: "Rockwell", cveId: "CVE-2024-7515", datePublished: "2024-08-14T19:40:20.990Z", dateReserved: "2024-08-05T20:19:29.235Z", dateUpdated: "2024-08-14T19:59:57.056Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2024-10-14 21:15
Modified
2024-10-21 13:20
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3CCECB24-3DF9-441D-B2E0-7EDD305EA31D", versionEndExcluding: "33.017", versionStartIncluding: "28.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "999BE839-8688-4723-A067-788386E528D7", versionEndExcluding: "34.014", versionStartIncluding: "34.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D70BDEA5-B19E-4399-AD46-FA94285B2DEA", versionEndExcluding: "35.013", versionStartIncluding: "35.011", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F8EF3D88-B9BC-4FEA-BA35-8657EEE463F2", versionEndExcluding: "33.017", versionStartIncluding: "33.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A3A96A6-242A-4022-8347-E04467DA6FDA", versionEndExcluding: "34.014", versionStartIncluding: "34.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D377807-09D3-4430-8B0D-83BB5514B275", versionEndExcluding: "35.013", versionStartIncluding: "35.011", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:controllogix_5580_process:-:*:*:*:*:*:*:*", matchCriteriaId: "AFEDADD8-01DE-4AE5-A0D7-532347FA7DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BF92BE9B-AF7A-4A04-9438-C30C5ED49B07", versionEndExcluding: "33.017", versionStartIncluding: "31.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D0E0F65D-98D1-4021-9CB0-402834F46DD8", versionEndExcluding: "34.014", versionStartIncluding: "34.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "956AF3D2-9A47-4BAD-B3A5-37A8965DBB2E", versionEndExcluding: "35.013", versionStartIncluding: "35.011", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "006B7683-9FDF-4748-BA28-2EA22613E092", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C85E19A-8153-4AC2-8A15-DD1CEE9F5B2E", versionEndExcluding: "33.017", versionStartIncluding: "28.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "90519681-C70B-49EE-A551-29D5A9EFCA31", versionEndExcluding: "34.014", versionStartIncluding: "34.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A306250-9B1A-49A4-B6C1-E2EFBA49504B", versionEndExcluding: "35.013", versionStartIncluding: "35.011", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*", matchCriteriaId: "EDD040ED-B44C-47D0-B4D4-729C378C4F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "93D9D75D-0C98-408B-9EB1-6315AAE1147B", versionEndExcluding: "33.017", versionStartIncluding: "31.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "58CAFC2B-2C95-41E0-BB00-7E7F89103664", versionEndExcluding: "34.014", versionStartIncluding: "34.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "37997377-0939-4D3C-8A97-F4F8C6FB1000", versionEndExcluding: "35.013", versionStartIncluding: "35.011", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_2:-:*:*:*:*:*:*:*", matchCriteriaId: "E594CDF6-0582-4D5C-B6AA-C8A2E752E29F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D85D8A23-BC23-41F9-A17A-33239D4C90B5", versionEndExcluding: "33.017", versionStartIncluding: "32.013", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13C157F1-BD62-4F6A-8DCF-4660983C9948", versionEndExcluding: "34.014", versionStartIncluding: "34.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A01F13C3-42C1-409C-A16E-6BEC723108A2", versionEndExcluding: "35.013", versionStartIncluding: "35.011", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_3:-:*:*:*:*:*:*:*", matchCriteriaId: "B82D842C-0930-41AA-83CD-5F235771AE4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A890317E-B6BD-4A0A-B7E0-E50D90506EF1", versionEndExcluding: "33.017", versionStartIncluding: "32.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "881D835B-D7E3-44C5-9B77-CA82EDCE2D3C", versionEndExcluding: "34.014", versionStartIncluding: "34.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A0ABD910-7EBE-44C8-97E3-2B523CDEE5FA", versionEndExcluding: "35.013", versionStartIncluding: "35.011", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", matchCriteriaId: "80F4F5BE-07DF-402A-BF98-34FBA6A11968", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:factorytalk_logix_echo_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02105DF7-661C-47E7-BC52-771356537783", versionEndExcluding: "34.014", versionStartIncluding: "33.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:factorytalk_logix_echo_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "51ECB73D-C08C-4DE1-BA75-608E9C350751", versionEndExcluding: "35.013", versionStartIncluding: "35.011", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:factorytalk_logix_echo:-:*:*:*:*:*:*:*", matchCriteriaId: "7898895B-17A1-499A-9B09-9F6C1C302368", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.", }, { lang: "es", value: "CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html y enviar un mensaje CIP especialmente manipulado al dispositivo. Si se explota, un actor de amenazas podría ayudar a evitar el acceso al usuario legítimo y finalizar las conexiones a los dispositivos conectados, incluida la estación de trabajo. Para recuperar los controladores, se requiere una descarga que finalice cualquier proceso que esté ejecutando el controlador.", }, ], id: "CVE-2024-6207", lastModified: "2024-10-21T13:20:45.617", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "PSIRT@rockwellautomation.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], cvssMetricV40: [ { cvssData: { Automatable: "NOT_DEFINED", Recovery: "NOT_DEFINED", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", availabilityRequirement: "NOT_DEFINED", baseScore: 8.7, baseSeverity: "HIGH", confidentialityRequirement: "NOT_DEFINED", exploitMaturity: "NOT_DEFINED", integrityRequirement: "NOT_DEFINED", modifiedAttackComplexity: "NOT_DEFINED", modifiedAttackRequirements: "NOT_DEFINED", modifiedAttackVector: "NOT_DEFINED", modifiedPrivilegesRequired: "NOT_DEFINED", modifiedSubAvailabilityImpact: "NOT_DEFINED", modifiedSubConfidentialityImpact: "NOT_DEFINED", modifiedSubIntegrityImpact: "NOT_DEFINED", modifiedUserInteraction: "NOT_DEFINED", modifiedVulnAvailabilityImpact: "NOT_DEFINED", modifiedVulnConfidentialityImpact: "NOT_DEFINED", modifiedVulnIntegrityImpact: "NOT_DEFINED", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "NONE", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "NOT_DEFINED", }, source: "PSIRT@rockwellautomation.com", type: "Secondary", }, ], }, published: "2024-10-14T21:15:12.460", references: [ { source: "PSIRT@rockwellautomation.com", tags: [ "Vendor Advisory", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1707.html", }, ], sourceIdentifier: "PSIRT@rockwellautomation.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "PSIRT@rockwellautomation.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-08-14 20:15
Modified
2025-03-04 17:11
Severity ?
Summary
CVE-2024-7515 IMPACT
A denial-of-service vulnerability exists in the affected products. A malformed PTP management packet can cause a major nonrecoverable fault in the controller.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AABBF4EF-9F0E-432D-A535-F74402CFD05D", versionEndExcluding: "34.014", versionStartIncluding: "28.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "305CDBFF-404A-45F5-A391-1B18F446D1B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*", matchCriteriaId: "EDD040ED-B44C-47D0-B4D4-729C378C4F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E5B18F7F-80AB-4146-9D65-B1DB4C2FAA8D", versionEndExcluding: "34.014", versionStartIncluding: "28.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "A29D3775-CAB3-45CF-96CE-71D0672C7E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CC2E9A2F-AFC7-442D-88FC-C3217ABB560E", versionEndExcluding: "34.014", versionStartIncluding: "31.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "64CAC9B1-19E5-44BB-B814-DDA98B7290E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "006B7683-9FDF-4748-BA28-2EA22613E092", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "560A9F50-DBCF-48CF-856B-BE061C490697", versionEndExcluding: "34.014", versionStartIncluding: "31.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "F7A5DA9B-E1CA-45FF-8A9B-60B1E506F981", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_2:-:*:*:*:*:*:*:*", matchCriteriaId: "E594CDF6-0582-4D5C-B6AA-C8A2E752E29F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3631A2E0-00BA-4DF2-94C2-6906B9A3E941", versionEndExcluding: "34.014", versionStartIncluding: "32.013", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "ABE90277-EB8A-4ECE-A573-C1814F35CB47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_3:-:*:*:*:*:*:*:*", matchCriteriaId: "B82D842C-0930-41AA-83CD-5F235771AE4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8C025589-66EE-40EF-8CE6-9A7B76D74BF4", versionEndExcluding: "34.014", versionStartIncluding: "32.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "61F8EA3B-C51C-4CB1-9BB3-017577DC6684", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", matchCriteriaId: "80F4F5BE-07DF-402A-BF98-34FBA6A11968", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "CVE-2024-7515 IMPACT\n\nA denial-of-service vulnerability exists in the affected products. A malformed PTP management packet can cause a major nonrecoverable fault in the controller.", }, { lang: "es", value: "CVE-2024-7515 IMPACT Existe una vulnerabilidad de denegación de servicio en los productos afectados. Un paquete de administración PTP con formato incorrecto puede causar un fallo importante no recuperable en el controlador.", }, ], id: "CVE-2024-7515", lastModified: "2025-03-04T17:11:31.917", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], cvssMetricV40: [ { cvssData: { Automatable: "NOT_DEFINED", Recovery: "NOT_DEFINED", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", availabilityRequirement: "NOT_DEFINED", baseScore: 8.7, baseSeverity: "HIGH", confidentialityRequirement: "NOT_DEFINED", exploitMaturity: "NOT_DEFINED", integrityRequirement: "NOT_DEFINED", modifiedAttackComplexity: "NOT_DEFINED", modifiedAttackRequirements: "NOT_DEFINED", modifiedAttackVector: "NOT_DEFINED", modifiedPrivilegesRequired: "NOT_DEFINED", modifiedSubAvailabilityImpact: "NOT_DEFINED", modifiedSubConfidentialityImpact: "NOT_DEFINED", modifiedSubIntegrityImpact: "NOT_DEFINED", modifiedUserInteraction: "NOT_DEFINED", modifiedVulnAvailabilityImpact: "NOT_DEFINED", modifiedVulnConfidentialityImpact: "NOT_DEFINED", modifiedVulnIntegrityImpact: "NOT_DEFINED", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "NONE", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "NOT_DEFINED", }, source: "PSIRT@rockwellautomation.com", type: "Secondary", }, ], }, published: "2024-08-14T20:15:13.150", references: [ { source: "PSIRT@rockwellautomation.com", tags: [ "Vendor Advisory", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201686.html", }, ], sourceIdentifier: "PSIRT@rockwellautomation.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "PSIRT@rockwellautomation.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-08-14 20:15
Modified
2025-03-04 17:11
Severity ?
Summary
CVE-2024-7507 IMPACT
A denial-of-service vulnerability exists in the affected products. This vulnerability occurs when a malformed PCCC message is received, causing a fault in the controller.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AABBF4EF-9F0E-432D-A535-F74402CFD05D", versionEndExcluding: "34.014", versionStartIncluding: "28.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "305CDBFF-404A-45F5-A391-1B18F446D1B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*", matchCriteriaId: "EDD040ED-B44C-47D0-B4D4-729C378C4F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E5B18F7F-80AB-4146-9D65-B1DB4C2FAA8D", versionEndExcluding: "34.014", versionStartIncluding: "28.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "A29D3775-CAB3-45CF-96CE-71D0672C7E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CC2E9A2F-AFC7-442D-88FC-C3217ABB560E", versionEndExcluding: "34.014", versionStartIncluding: "31.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "64CAC9B1-19E5-44BB-B814-DDA98B7290E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "006B7683-9FDF-4748-BA28-2EA22613E092", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "560A9F50-DBCF-48CF-856B-BE061C490697", versionEndExcluding: "34.014", versionStartIncluding: "31.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "F7A5DA9B-E1CA-45FF-8A9B-60B1E506F981", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_2:-:*:*:*:*:*:*:*", matchCriteriaId: "E594CDF6-0582-4D5C-B6AA-C8A2E752E29F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3631A2E0-00BA-4DF2-94C2-6906B9A3E941", versionEndExcluding: "34.014", versionStartIncluding: "32.013", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "ABE90277-EB8A-4ECE-A573-C1814F35CB47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_3:-:*:*:*:*:*:*:*", matchCriteriaId: "B82D842C-0930-41AA-83CD-5F235771AE4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8C025589-66EE-40EF-8CE6-9A7B76D74BF4", versionEndExcluding: "34.014", versionStartIncluding: "32.011", vulnerable: true, }, { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:35.011:*:*:*:*:*:*:*", matchCriteriaId: "61F8EA3B-C51C-4CB1-9BB3-017577DC6684", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", matchCriteriaId: "80F4F5BE-07DF-402A-BF98-34FBA6A11968", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "CVE-2024-7507 IMPACT\n\nA denial-of-service vulnerability exists in the affected products. This vulnerability occurs when a malformed PCCC message is received, causing a fault in the controller.", }, { lang: "es", value: " CVE-2024-7507 IMPACT Existe una vulnerabilidad de denegación de servicio en los productos afectados. Esta vulnerabilidad ocurre cuando se recibe un mensaje PCCC con formato incorrecto, lo que provoca un fallo en el controlador.", }, ], id: "CVE-2024-7507", lastModified: "2025-03-04T17:11:31.917", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], cvssMetricV40: [ { cvssData: { Automatable: "NOT_DEFINED", Recovery: "NOT_DEFINED", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", availabilityRequirement: "NOT_DEFINED", baseScore: 8.7, baseSeverity: "HIGH", confidentialityRequirement: "NOT_DEFINED", exploitMaturity: "NOT_DEFINED", integrityRequirement: "NOT_DEFINED", modifiedAttackComplexity: "NOT_DEFINED", modifiedAttackRequirements: "NOT_DEFINED", modifiedAttackVector: "NOT_DEFINED", modifiedPrivilegesRequired: "NOT_DEFINED", modifiedSubAvailabilityImpact: "NOT_DEFINED", modifiedSubConfidentialityImpact: "NOT_DEFINED", modifiedSubIntegrityImpact: "NOT_DEFINED", modifiedUserInteraction: "NOT_DEFINED", modifiedVulnAvailabilityImpact: "NOT_DEFINED", modifiedVulnConfidentialityImpact: "NOT_DEFINED", modifiedVulnIntegrityImpact: "NOT_DEFINED", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "NONE", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "NOT_DEFINED", }, source: "PSIRT@rockwellautomation.com", type: "Secondary", }, ], }, published: "2024-08-14T20:15:12.900", references: [ { source: "PSIRT@rockwellautomation.com", tags: [ "Vendor Advisory", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201685.html", }, ], sourceIdentifier: "PSIRT@rockwellautomation.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "PSIRT@rockwellautomation.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-09-12 20:15
Modified
2024-09-19 14:31
Severity ?
Summary
A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:32.011:*:*:*:*:*:*:*", matchCriteriaId: "D389E07F-A04E-467A-8FE4-4DE8B69EF7EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*", matchCriteriaId: "EDD040ED-B44C-47D0-B4D4-729C378C4F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:32.013:*:*:*:*:*:*:*", matchCriteriaId: "CCF40770-68D8-41E8-B0DC-61BEFD2DA987", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_2:-:*:*:*:*:*:*:*", matchCriteriaId: "E594CDF6-0582-4D5C-B6AA-C8A2E752E29F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:32.011:*:*:*:*:*:*:*", matchCriteriaId: "7F2345A8-E3BD-45C2-AEE8-189C81D6C23F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_3:-:*:*:*:*:*:*:*", matchCriteriaId: "B82D842C-0930-41AA-83CD-5F235771AE4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:32.011:*:*:*:*:*:*:*", matchCriteriaId: "D7EB2F5A-34D4-49C6-9B58-632DFA6B69E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", matchCriteriaId: "80F4F5BE-07DF-402A-BF98-34FBA6A11968", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:33.011:*:*:*:*:*:*:*", matchCriteriaId: "F032C078-D896-47EC-8393-10803E832C18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:32.011:*:*:*:*:*:*:*", matchCriteriaId: "BAE872BB-FC1F-4B70-92AD-B1213A347C89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", matchCriteriaId: "006B7683-9FDF-4748-BA28-2EA22613E092", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rockwellautomation:1756-en4_firmware:2.001:*:*:*:*:*:*:*", matchCriteriaId: "B389BA8B-56CD-4614-BC77-02FC80981FA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:rockwellautomation:1756-en4:-:*:*:*:*:*:*:*", matchCriteriaId: "6935642C-4CBF-4B4F-A509-561B3E39A66B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.", }, { lang: "es", value: "Existe una vulnerabilidad de denegación de servicio en los productos afectados de Rockwell Automation cuando se envían paquetes especialmente manipulados al objeto de seguridad CIP. Si se explota, el dispositivo dejará de estar disponible y será necesario restablecer la configuración de fábrica para recuperarse.", }, ], id: "CVE-2024-6077", lastModified: "2024-09-19T14:31:18.463", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], cvssMetricV40: [ { cvssData: { Automatable: "NOT_DEFINED", Recovery: "NOT_DEFINED", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", availabilityRequirement: "NOT_DEFINED", baseScore: 8.7, baseSeverity: "HIGH", confidentialityRequirement: "NOT_DEFINED", exploitMaturity: "NOT_DEFINED", integrityRequirement: "NOT_DEFINED", modifiedAttackComplexity: "NOT_DEFINED", modifiedAttackRequirements: "NOT_DEFINED", modifiedAttackVector: "NOT_DEFINED", modifiedPrivilegesRequired: "NOT_DEFINED", modifiedSubAvailabilityImpact: "NOT_DEFINED", modifiedSubConfidentialityImpact: "NOT_DEFINED", modifiedSubIntegrityImpact: "NOT_DEFINED", modifiedUserInteraction: "NOT_DEFINED", modifiedVulnAvailabilityImpact: "NOT_DEFINED", modifiedVulnConfidentialityImpact: "NOT_DEFINED", modifiedVulnIntegrityImpact: "NOT_DEFINED", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "NONE", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "NOT_DEFINED", }, source: "PSIRT@rockwellautomation.com", type: "Secondary", }, ], }, published: "2024-09-12T20:15:05.440", references: [ { source: "PSIRT@rockwellautomation.com", tags: [ "Vendor Advisory", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1963.html", }, ], sourceIdentifier: "PSIRT@rockwellautomation.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "PSIRT@rockwellautomation.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }