Rockwell Automation Logix Controllers
Rockwell Automation Logix controllers contain a vulnerability allowing authenticated attackers to execute arbitrary CIP (Common Industrial Protocol) programming and configuration commands. This could permit modification of process logic, alteration of setpoints, or disabling of safety functions on affected ControlLogix 5580, GuardLogix 5580, and 1756-EN series network adapter modules. The vulnerability requires valid engineering credentials and network access to the controller. Several older hardware series (A versions) have no patch available and require hardware upgrade to Series D.
- Valid engineering workstation credentials (username/password or certificate)
- Network access to the Logix controller on port 2222 (default EtherNet/IP) or configured CIP port
- Controller not in RUN mode (mode switch in RUN position blocks CIP commands)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4ac69348-146d-4e10-a8f6-161cb92e10f5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.