Rockwell Automation Studio 5000 Logix Designer
Successful exploitation allows an attacker with local access to an engineering workstation running Studio 5000 Logix Designer to download a modified program to ControlLogix 5580, GuardLogix 5580, CompactLogix 5380/5480, or Compact GuardLogix 5380 controllers. The modified program would execute without detection by standard means. No direct mitigation exists in the software; detection requires manual program comparison using Logix Designer Compare Tool v9+ or FactoryTalk AssetCentre v12+. Rockwell Automation recommends upgrading to Studio 5000 v34 or later and implementing periodic program verification on an uncompromised workstation. No public exploits exist, and this vulnerability is not remotely exploitable.
- Local access to an engineering workstation running Studio 5000 Logix Designer
- Ability to connect the workstation to the target controller (USB, Ethernet, or serial)
- Knowledge of the program download process in Logix Designer
- Access requires high privilege (engineering credentials typically restricted on the workstation)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d6d78b89-e719-4ac9-ab2c-c96dab87ef3c