Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix 5380
An input validation flaw in CIP (Common Industrial Protocol) handling on Rockwell Automation ControlLogix 5580, CompactLogix 5380/5480, and GuardLogix 5580 PLCs allows remote attackers to cause a device denial of service by sending a specially crafted CIP packet. The vulnerability affects these devices only when CIP security is enabled. Successful exploitation causes the PLC to become unresponsive and requires a factory reset to recover operations. The flaw is present in ControlLogix 5580 v32.011, CompactLogix 5380 v32.011, CompactLogix 5380 Process v33.011, Compact GuardLogix 5380 SIL 2 v32.013, Compact GuardLogix 5380 SIL 3 v32.011, CompactLogix 5480 v32.011, GuardLogix 5580 v32.011, and 1756-EN4 v2.001.
- Network access to the PLC on the industrial protocol port (CIP, typically UDP/TCP port 2222 or Ethernet/IP)
- CIP security feature must be enabled on the device (default configuration varies; check your device settings)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3a2a8a9e-1705-4a9c-95ef-41e63255cbc3