Rockwell Automation CompactLogix 5370 and ControlLogix 5570 Controllers (Update A)
A CIP protocol parsing vulnerability in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 controllers allows an attacker to send specially crafted EtherNet/IP packets that cause denial-of-service by disrupting controller communications. The vulnerability affects ControlLogix 5570 (version 33 and prior), CompactLogix 5370 L1/L2/L3, Compact GuardLogix 5370, Armor Compact GuardLogix 5370, and Armor GuardLogix Safety Controllers all at version 33 and prior. Rockwell Automation recommends updating to firmware v33.011 or later to remediate the issue.
- Network access to the controller on port 2222 (EtherNet/IP)
- No authentication required to send CIP packets
- Controller must be running firmware version 33 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0189ae0f-8880-42fc-a0a1-3c910e00cd7aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.