Rockwell Automation ControlLogix and GuardLogix
A denial-of-service vulnerability exists in Rockwell Automation ControlLogix 5570 and GuardLogix 5570 programmable logic controllers. The flaw allows an attacker with network access to send a specially crafted packet that crashes the device by triggering a buffer overflow (CWE-119). The affected firmware versions are ControlLogix 5570 v20.011, ControlLogix 5570 Redundancy v20.054_kit1, and GuardLogix 5570 v20.011. Exploitation causes the PLC to stop responding and requires manual restart to restore operations. No user interaction or credentials are required; the attacker needs only network reachability to the device.
- Network access to the PLC on its control port (typically port 2222 for EtherNet/IP)
- The PLC must be running one of the affected firmware versions (v20.011 or earlier)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d986bf99-ecae-4b4a-84e9-04837e7c9b7bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.