Rockwell Automation Stratix and ArmorStratix Switches
Multiple memory corruption, input validation, and format string vulnerabilities exist in Allen-Bradley Stratix 5400, 5410, 5700, 8000 and ArmorStratix 5700 industrial Ethernet switches running firmware 15.2(6)E0a and earlier. These affect the device management interface and Smart Install feature. Successful exploitation can cause memory exhaustion, module restart, information corruption, or information disclosure. The vulnerabilities are actively being exploited. The vulnerabilities include CWE-20 (improper input validation), CWE-119 (improper buffer handling), and CWE-134 (use of externally-controlled format strings).
- Network access to the switch management IP address (typically port 22 for SSH, port 80/443 for HTTP/HTTPS)
- For Smart Install vulnerabilities: TCP port 4786 must be reachable if Smart Install is enabled
- No valid credentials required for some attack vectors
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4a3d0787-ee7c-4564-9e21-3c03dcf61d55Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.