Rockwell Automation Stratix Devices Containing Cisco IOS
Rockwell Automation Stratix network switches contain multiple vulnerabilities in embedded Cisco IOS that could allow code execution and denial-of-service. The vulnerabilities stem from improper input validation, weak authentication handling, and path traversal flaws (CWE-863, CWE-20, CWE-22). Stratix 5800 switches running firmware prior to v17.04.01 are vulnerable to all identified flaws. Stratix 5400/5410 switches running firmware prior to v15.2(7)E2 are vulnerable to CVE-2020-3200. No public exploit code is currently available.
- Network access to the Stratix device management interface (SSH, Telnet, or HTTP)
- Valid user credentials for device authentication
- Device running vulnerable Cisco IOS firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/eb798b44-2d24-46fa-921e-d56cf1e0090eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.