Rockwell Automation Logix controllers
A vulnerability in Rockwell Automation Logix controllers (CompactLogix 5380/5480, Compact GuardLogix 5380, ControlLogix 5580, GuardLogix 5580) in firmware version 31.011 and later allows an unauthenticated attacker to send a malformed packet that causes the controller to crash and become unavailable (denial-of-service). The vulnerability exists in input validation and does not require credentials or user interaction. Rockwell Automation has released patched firmware versions (32.016 or later, 33.015 or later, or 34.011 or later depending on the firmware branch).
- Network reachability to the Logix controller on its service port (typically EtherNet/IP port 2222 or 44818)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/efe21d20-9865-49d5-9677-03a2f39f2dd5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.