Rockwell Automation Allen-Bradley Stratix 5950
The Stratix 5950 industrial switch contains certificate validation bypass and denial-of-service vulnerabilities. An attacker can bypass client certificate checks to establish unauthorized connections to the device, or cause it to crash by exceeding its connection handling limits. The issues stem from improper input validation (CWE-20), incomplete certificate verification (CWE-295), and inadequate resource management (CWE-841). Rockwell Automation has not released firmware patches; the company is still developing corrections and will notify users when available. The underlying issues are embedded in the switch's firmware and cannot be patched by configuration changes alone.
- Network access to the Stratix 5950 management interface
- Device must be connected to a network reachable from the attacker's position
- No valid credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/95ce5d31-e1e1-4468-9052-e41e2c0944b1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.