Vulnerabilites related to rockwellautomation - compactlogix_5380_process_firmware
Vulnerability from fkie_nvd
Published
2024-04-15 22:15
Modified
2025-03-04 17:43
Summary
A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:35.011:*:*:*:*:*:*:*",
                     matchCriteriaId: "A29D3775-CAB3-45CF-96CE-71D0672C7E37",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:35.011:*:*:*:*:*:*:*",
                     matchCriteriaId: "64CAC9B1-19E5-44BB-B814-DDA98B7290E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "006B7683-9FDF-4748-BA28-2EA22613E092",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:35.011:*:*:*:*:*:*:*",
                     matchCriteriaId: "305CDBFF-404A-45F5-A391-1B18F446D1B8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD040ED-B44C-47D0-B4D4-729C378C4F68",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:35.011:*:*:*:*:*:*:*",
                     matchCriteriaId: "9232043F-8A87-446C-8B7E-F8E400AA6F68",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62414E65-73C7-4172-B7BF-F40A66AFBB90",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:rockwellautomation:1756-en4tr_firmware:5.001:*:*:*:*:*:*:*",
                     matchCriteriaId: "91162BBB-AD61-4191-B00A-FDE767268F13",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:rockwellautomation:1756-en4tr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "898EE953-E0EF-4B52-8EA0-41AAD8B5CCF3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:35.011:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A1541AE-A429-455E-94C4-3420183CE7CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:rockwellautomation:controllogix_5580_process:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFEDADD8-01DE-4AE5-A0D7-532347FA7DB2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5380_process_firmware:35.011:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF838222-B4B6-4A66-B3CE-55E643368754",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5380_process:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77BCC249-D601-4A82-9247-C0981BF990FC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:35.011:*:*:*:*:*:*:*",
                     matchCriteriaId: "61F8EA3B-C51C-4CB1-9BB3-017577DC6684",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F4F5BE-07DF-402A-BF98-34FBA6A11968",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "\nA specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices. \n\n",
      },
      {
         lang: "es",
         value: "Un tipo de paquete fragmentado con formato incorrecto específico (los dispositivos que envían grandes cantidades de datos pueden generar paquetes fragmentados automáticamente) puede causar una falla mayor no recuperable (MNRF) en ControlLogix 5580, Guard Logix 5580, CompactLogix 5380 y 1756-EN4TR de Rockwell Automation. Si se explota, el producto afectado dejará de estar disponible y requerirá un reinicio manual para recuperarlo. Además, un MNRF podría provocar una pérdida de visión y/o control de los dispositivos conectados.",
      },
   ],
   id: "CVE-2024-3493",
   lastModified: "2025-03-04T17:43:27.223",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.6,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4,
            source: "PSIRT@rockwellautomation.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-15T22:15:09.073",
   references: [
      {
         source: "PSIRT@rockwellautomation.com",
         tags: [
            "Broken Link",
         ],
         url: "https://www.rockwellautomation.com/en-us/support/advisory.SD1666.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://www.rockwellautomation.com/en-us/support/advisory.SD1666.html",
      },
   ],
   sourceIdentifier: "PSIRT@rockwellautomation.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "PSIRT@rockwellautomation.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2024-3493
Vulnerability from cvelistv5
Published
2024-04-15 21:17
Modified
2024-08-12 15:16
Summary
A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T20:12:07.675Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.rockwellautomation.com/en-us/support/advisory.SD1666.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:35.011:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "guardlogix_5580_firmware",
                  vendor: "rockwellautomation",
                  versions: [
                     {
                        status: "affected",
                        version: "35.011",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:5.001:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "compactlogix_5380_firmware",
                  vendor: "rockwellautomation",
                  versions: [
                     {
                        status: "affected",
                        version: "35.011",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:o:rockwellautomation:1756-en4tr_firmware:5.001:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "1756-en4tr_firmware",
                  vendor: "rockwellautomation",
                  versions: [
                     {
                        status: "affected",
                        version: "5.001",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:o:rockwellautomation:1756-en4tr_firmware:5.001:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "1756-en4tr_firmware",
                  vendor: "rockwellautomation",
                  versions: [
                     {
                        status: "affected",
                        version: "5.001",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-3493",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-12T15:09:28.736089Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-12T15:16:08.155Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "ControlLogix 5580",
               vendor: "Rockwell Automation",
               versions: [
                  {
                     status: "affected",
                     version: "v35.011",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "GuardLogix 5580",
               vendor: "Rockwell Automation",
               versions: [
                  {
                     status: "affected",
                     version: "v35.011",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "CompactLogix 5380",
               vendor: "Rockwell Automation",
               versions: [
                  {
                     status: "affected",
                     version: "v5.001",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "1756-EN4TR",
               vendor: "Rockwell Automation",
               versions: [
                  {
                     status: "affected",
                     version: "v5.001",
                  },
               ],
            },
         ],
         datePublic: "2024-04-12T01:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n<span style=\"background-color: rgb(255, 255, 255);\">A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix&nbsp;5580,&nbsp;CompactLogix 5380,&nbsp;and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices. </span>\n\n",
                  },
               ],
               value: "\nA specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices. \n\n",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-137",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-137 Parameter Injection",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.6,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20 Improper Input Validation",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-15T21:29:33.269Z",
            orgId: "b73dd486-f505-4403-b634-40b078b177f0",
            shortName: "Rockwell",
         },
         references: [
            {
               url: "https://www.rockwellautomation.com/en-us/support/advisory.SD1666.html",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n<p>\n\n</p><table><tbody><tr><td><p><br>Affected Product</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>First Known in Firmware Revision</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>Corrected in Firmware Revision</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>ControlLogix® 5580</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>V35.011</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>V35.013, V36.011</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>GuardLogix 5580</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>V35.011</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>V35.013, V36.011</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>CompactLogix 5380</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>V35.011</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>V35.013, V36.011</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>1756-EN4TR</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>V5.001</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>V6.001</p><p>&nbsp;</p><p>&nbsp;</p></td></tr></tbody></table>\n\n<br><br><p></p><p>Users using the affected software and who are not able to upgrade to one of the corrected versions are encouraged to apply security best practices, where possible.  </p><ul><li><p><a target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\">Security Best Practices</a>&nbsp;</p></li></ul>\n\n<br>",
                  },
               ],
               value: "\nAffected Product\n\n \n\n \n\n \n\n \n\nFirst Known in Firmware Revision\n\n \n\n \n\n \n\n \n\nCorrected in Firmware Revision\n\n \n\n \n\n \n\n \n\nControlLogix® 5580\n\n \n\n \n\n \n\n \n\nV35.011\n\n \n\n \n\n \n\n \n\nV35.013, V36.011\n\n \n\n \n\n \n\n \n\nGuardLogix 5580\n\n \n\n \n\n \n\n \n\nV35.011\n\n \n\n \n\n \n\n \n\nV35.013, V36.011\n\n \n\n \n\n \n\n \n\nCompactLogix 5380\n\n \n\n \n\n \n\n \n\nV35.011\n\n \n\n \n\n \n\n \n\nV35.013, V36.011\n\n \n\n \n\n \n\n \n\n1756-EN4TR\n\n \n\n \n\n \n\n \n\nV5.001\n\n \n\n \n\n \n\n \n\nV6.001\n\n \n\n \n\nUsers using the affected software and who are not able to upgrade to one of the corrected versions are encouraged to apply security best practices, where possible.  \n\n  *   Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight  \n\n",
            },
         ],
         source: {
            discovery: "INTERNAL",
         },
         title: "Rockwell Automation ControlLogix and GaurdLogix Vulnerable to Major Nonrecoverable Fault Due to Invalid Header Value",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b73dd486-f505-4403-b634-40b078b177f0",
      assignerShortName: "Rockwell",
      cveId: "CVE-2024-3493",
      datePublished: "2024-04-15T21:17:36.077Z",
      dateReserved: "2024-04-08T21:46:38.867Z",
      dateUpdated: "2024-08-12T15:16:08.155Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}