Rockwell Automation Allen-Bradley CompactLogix Reflective Cross-Site Scripting Vulnerability (Update A)
Reflective cross-site scripting (XSS) vulnerability in Rockwell Automation Allen-Bradley CompactLogix controllers and EtherNet/IP modules. The vulnerability exists in the web interface and can be exploited when a user clicks a malicious link containing crafted script code. The flaw affects multiple CompactLogix models (1769-L series) running firmware version 27.011 or earlier, and EtherNet/IP adapter modules (1756-EN2F, 1756-EN2T, 1756-EN2TR, 1756-EN3TR series) across multiple firmware versions. Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the user's browser session, potentially leading to session hijacking, credential theft, or unauthorized configuration changes.
- User must be authenticated to the CompactLogix or EtherNet/IP device web interface
- User must click on an attacker-supplied link while logged in
- Web interface must be accessible (not blocked by firewall or network segmentation)
- User interaction required (social engineering or phishing email)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/076d6c31-5f0b-4bc1-9caf-dc292da64788