Rockwell Automation ControlLogix, GuardLogix 5580, CompactLogix, and Compact GuardLogix 5380
A input validation vulnerability in Rockwell Automation ControlLogix 5580, GuardLogix 5580, CompactLogix 5380/5480, and Compact GuardLogix 5380 controllers allows an attacker to crash the device by sending a malformed CIP (Common Industrial Protocol) message. The device fails to properly validate the input, resulting in a denial of service condition. Successful exploitation causes the controller to stop executing logic, interrupting production processes. The vulnerability affects devices running firmware versions prior to v36.011, v35.013, or v34.014. No public exploitation has been reported, but the attack requires only network access and no credentials.
- Network access to the controller on port 44818 (EtherNet/IP)
- No credentials required
- Device must be running firmware version prior to v36.011/v35.013/v34.014
Patching may require device reboot — plan for process interruption
/api/v1/advisories/802f5484-257a-42ff-b288-568ecaebab04Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.