Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules
An unauthenticated attacker can send EtherNet/IP protocol messages to MicroLogix 1400 controllers and 1756 ControlLogix communications modules to modify system settings and cause loss of communication between the device and the control system. The vulnerability affects all versions of most 1756-EN series communication modules (1756-ENBT, 1756-EN2F Series A and B, 1756-EN2T Series A and B, 1756-EN2TR Series A and B, 1756-EN3TR Series A, and 1756-EWEB all series) and all versions of MicroLogix 1400 Series A. MicroLogix 1400 Series B and C are vulnerable in firmware version 21.003 and earlier. Some 1756-EN modules have firmware patches available (FRN 11.001 and later for 1756-EN2F Series C, 1756-EN2T Series D, 1756-EN2TR Series C, and 1756-EN3TR Series B; FRN 21.004 and later for MicroLogix 1400 Series B and C), but many devices including Series A controllers have no direct mitigation available from the vendor.
- Network access to port 2222/TCP or UDP or port 44818/TCP or UDP
- Device must be reachable from the attacker's network segment
- No authentication or special privileges required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5ab92152-e042-4d7c-a034-526b72393c29