Rockwell Automation products using GoAhead Web Server
Multiple Rockwell Automation products using the GoAhead Web Server contain vulnerabilities (CWE-835 infinite loop and CWE-416 use-after-free) that allow unauthenticated remote attackers to execute arbitrary code, read sensitive information, or cause denial of service. Affected products include CompactLogix 5380/5480, ControlLogix 5580, GuardLogix 5580, Compact GuardLogix 5380 controllers, 1756-EN2T/D, 1756-EN2TR/C, 1756-EN2F/C, 1756-EN2TP/A ethernet modules, 1756-HIST data logging modules, 1769-AENTR, 1747-AENTR, 5069-AEN2TR, and 1732E I/O modules. The vulnerabilities are exploitable through unauthenticated HTTP requests with low attack complexity. No public exploits are currently known, but the high EPSS score (77.4%) indicates significant exploitation risk.
- Network reachability to HTTP port 80 on the affected device
- No authentication required
- Device must be running a vulnerable firmware version with web server enabled
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3f252053-144c-43b1-a75d-feca3ed2b178