Rockwell Automation Logix Controllers (Update A)
A vulnerability in Rockwell Automation Logix controllers allows remote, unauthenticated attackers to bypass the verification mechanism and connect directly to controllers over EtherNet/IP (TCP port 44818). Once connected, an attacker can alter the controller's configuration, application code, or ladder logic without any credentials. The vulnerability affects all Logix controller types and firmware versions, including ControlLogix 5580/5570/5560/5550, GuardLogix 5580/5570/5560, CompactLogix 5370/1768/1769, RSLogix 5000, Studio 5000 Logix Designer, and FactoryTalk Security v2.10 and later. Rockwell Automation has determined that this vulnerability cannot be patched and recommends a defense-in-depth strategy combining network segmentation, firewall rules, CIP Security encryption, and operational controls.
- Network access to port 44818 on the Logix controller
- Controller must be reachable from the attacker's network segment
- No authentication or credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e81653c8-57ca-4cb9-b97a-dede469b7187