Rockwell Automation ControlLogix PLC Vulnerabilities
Multiple Rockwell Automation PLC controllers and EtherNet/IP network adapters contain vulnerabilities in the EtherNet/IP protocol implementation. The EtherNet/IP protocol allows unauthenticated access to PLC control functions. An attacker with network access to these devices can read program logic, modify controller parameters, upload/download code, or trigger operational commands without providing credentials. Affected products include ControlLogix (all versions), CompactLogix (all versions), GuardLogix (all versions), SoftLogix (version 18 and earlier), MicroLogix 1100/1400 (all versions), and various EtherNet/IP network interface modules (ENBT, EWEB, AENTR). CWEs involved are CWE-284 (improper access control), CWE-200 (exposure of sensitive information), CWE-20 (improper input validation), and CWE-294 (authentication bypass).
- Network access to EtherNet/IP port 2222 or 44818 on the PLC
- Device must be reachable from the attacker's network segment (same subnet or routed)
/api/v1/advisories/cd601578-576b-462c-97cc-a0eefe9e37ed