Rockwell Automation ControlLogix 5580 and CompactLogix 5380
A remotely exploitable denial-of-service vulnerability in ControlLogix 5580 and CompactLogix 5380 controllers allows an unauthenticated attacker to send specially crafted packets over the network that consume the device's memory or processing resources, causing the controller to become unresponsive. An affected controller that stops responding will fail to execute control logic, halt process operations, and requires manual intervention to restart. The ControlLogix 5580 is vulnerable in firmware versions 28.011, 28.012, 28.013, and 29.011. The CompactLogix 5380 is vulnerable in firmware versions 28.011 and 29.011.
- Network access to the affected ControlLogix 5580 or CompactLogix 5380 controller port 502 (EtherNet/IP)
- No credentials required
- No special device configuration required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a0e89f6c-8de4-4df4-9163-cc777e0fed86Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.