Rockwell Automation Kinetix 5700 DC Bus Power Supply
Plan Patch7.5ICS-CERT ICSA-23-199-01Jul 18, 2023
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
A denial-of-service vulnerability exists in Rockwell Automation Kinetix 5700 DC Bus Power Supply versions prior to 13.003. An attacker with network access can send a crafted request that causes the device to become unresponsive, disrupting DC power delivery to connected motor control systems. No user interaction or credentials are required for exploitation.
What this means
What could happen
An attacker who reaches the power supply could cause it to become unresponsive, resulting in loss of DC power to critical automation equipment and stopping production processes that depend on the Kinetix 5700 system.
Who's at risk
Energy sector operators using Rockwell Automation Kinetix 5700 DC bus power supplies in motor control centers, variable frequency drive systems, and other AC induction motor automation applications should care about this issue. The vulnerability affects the power supply itself, which is critical infrastructure in any facility that relies on coordinated motor control.
How it could be exploited
An attacker with network access to the Kinetix 5700 power supply can send a crafted network request that causes the device to stop responding. No credentials or user interaction are required. The attack is over the network and relatively simple to execute.
Prerequisites
- Network access to the Kinetix 5700 DC Bus Power Supply
- No credentials or authentication required
remotely exploitableno authentication requiredlow complexityhigh availability impact (denial of service)
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
Kinetix 5700: V13.001V13.00113.003
Remediation & Mitigation
0/4
Do now
0/1WORKAROUNDDeploy firewall rules to restrict network access to the Kinetix 5700 to only authorized engineering and control system devices
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpgrade Kinetix 5700 to firmware version 13.003 or later
Long-term hardening
0/2HARDENINGImplement network segmentation to isolate the Kinetix 5700 from business networks and the Internet
HARDENINGUse VPN for any required remote access to the control system network, and keep VPN software fully updated
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/db4e095e-15c8-4205-96fb-d09bf9d6d574