Rockwell Automation ControlLogix and GuardLogix (Update A)
A vulnerability in Rockwell Automation ControlLogix 5580, GuardLogix 5580, CompactLogix 5380, CompactLogix 5480, and Compact GuardLogix 5380 controllers and the 1756-EN4TR Ethernet module results from improper input validation (CWE-20) in firmware versions V35.011. An attacker can send a specially crafted network message to trigger a major nonrecoverable fault (MNRF), causing the controller to become unavailable and requiring manual recovery. The vulnerability is remotely exploitable over EtherNet/IP without authentication.
- Network access to the affected Rockwell Automation controller on ports used by EtherNet/IP (typically 44818/TCP and UDP)
- Device must be running one of the vulnerable firmware versions (V35.011)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f5cbe8cf-9bb5-4885-a7e2-6dbbe83aee4fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.