Rockwell Automation ControlLogix, GuardLogix 5580, CompactLogix, Compact GuardLogix 5380
A denial-of-service vulnerability exists in Rockwell Automation ControlLogix 5580, GuardLogix 5580, CompactLogix 5380, CompactLogix 5480, and Compact GuardLogix 5380 controllers. The vulnerability is triggered by improper validation of CIP (Common Industrial Protocol) messages sent to object 103 (0x67). An attacker with network access can cause the device to crash and become unresponsive. The vulnerability affects controllers with firmware versions below v36.011, v35.013, and v34.014 depending on the product line.
- Network reachability to the PLC on the CIP port (typically UDP 2222 or TCP 44818)
- No authentication required to send CIP messages
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d937035c-fe2f-412e-8669-1ce5365f34dbGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.