Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix 5380
A denial-of-service vulnerability exists in Rockwell Automation ControlLogix and CompactLogix programmable logic controllers (PLCs) when CIP Security is enabled. An attacker can send a malicious CIP security message over the network, causing the controller to become unresponsive and require a factory reset to restore operation. Affected products include CompactLogix 5380/5480, ControlLogix 5580, GuardLogix 5580, Compact GuardLogix 5380 (SIL 2/3), and the 1756-EN4 EtherNet/IP adapter card. The vulnerability is caused by improper validation of CIP security packets (CWE-20).
- Network access to EtherNet/IP port 2222 (default CIP port) or port 44818 (alternate CIP security port)
- CIP Security feature must be enabled on the target device (enabled by default on affected versions)
- No authentication required to send a malicious CIP packet
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3a2a8a9e-1705-4a9c-95ef-41e63255cbc3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.