Rockwell Automation Logix Controllers
The Rockwell Automation Logix controller family (CompactLogix 5370/5380/5480, ControlLogix 5570/5580, GuardLogix 5570/5580, and Compact GuardLogix 5370/5380) contains a vulnerability in message handling that allows an attacker to send specially crafted Ethernet/IP messages without authentication. Successful exploitation causes a denial-of-service condition, rendering the controller unresponsive until it is manually rebooted. The vulnerability affects firmware versions 33.013 and earlier (5370/GuardLogix 5570 models) and 32.013 and earlier (other models).
- Network access to port 2222 (EtherNet/IP) on the controller
- No authentication required—messages are processed by the device without credentials
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ea3f81a4-051e-4e80-bc65-3014e783c91bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.