Rockwell Automation Allen-Bradley Stratix and ArmorStratix
A buffer overflow vulnerability exists in Rockwell Automation Stratix and ArmorStratix managed Ethernet switches (models 5400, 5700, 5900, 8000, 8300 series, all firmware versions through 15.2(5)EA.fc4). An authenticated user with access to the switch management interface can send malformed input that overflows a memory buffer, allowing arbitrary code execution with switch-level privileges. This enables an attacker to intercept, modify, or disrupt network traffic carrying control signals between PLCs, HMIs, and field devices. The vulnerability is remotely exploitable and actively being exploited in the wild (KEV status). No firmware patch has been released by Rockwell Automation, and the vendor has not announced a timeline for remediation.
- Valid management credentials for the switch (admin or engineering account)
- Network access to the switch management interface (port 22 SSH or web interface port 80/443)
- No address space layout randomization (ASLR) mitigations in place on the switch
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b85d204c-a683-4f83-9a19-7765013d1f51