Rockwell Automation Logix Controllers
Rockwell Automation Logix controllers (CompactLogix 5380/5480, ControlLogix 5580, GuardLogix 5380/5580, and 1756-EN4TR modules) contain a resource exhaustion vulnerability in their network packet handling. Affected firmware versions include CompactLogix/ControlLogix/GuardLogix v33.011 through v33.014, and 1756-EN4TR v3.002. An attacker with network access can send malformed packets to trigger a denial-of-service condition, causing the controller to stop responding to legitimate traffic and halting controlled industrial processes until the device is restarted.
- Network access (direct or routed) to the controller's Ethernet port
- Controller running vulnerable firmware version (33.011 through 33.014 for CompactLogix/ControlLogix/GuardLogix 5000/5500 series, or 1756-EN4TR v3.002)
- No credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a491fee3-754b-4ed3-9e30-91ff1d7566b8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.