Rockwell Automation ControlLogix, GuardLogix, and CompactLogix
A denial-of-service vulnerability in Rockwell Automation ControlLogix, GuardLogix, and CompactLogix controllers running firmware V34.011 and earlier allows an unauthenticated attacker on the local network to send a specially crafted packet via mDNS (multicast DNS, port 5353) that causes the device to become unresponsive. The vulnerability affects all ControlLogix 5580, GuardLogix 5580, CompactLogix 5380, Compact GuardLogix 5380, and CompactLogix 5480 series controllers at the vulnerable version level, as well as the 1756-EN4 Ethernet module at V4.001. Successful exploitation results in loss of availability—the device stops responding to legitimate commands and operations until manually restarted. No public exploitation has been reported, but the vulnerability is remotely triggerable on any local-network-attached device.
- Layer 2 network access (same subnet/VLAN as the affected device)
- Device using mDNS for discovery (default behavior unless APD is enabled)
- Affected firmware version (V34.011 or earlier without patch)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7eb46438-67f3-46e8-849c-df56fb23e69e