Rockwell Automation ControlLogix
A vulnerability in Rockwell Automation ControlLogix and CompactLogix controllers allows an attacker to send a specially crafted CIP (Common Industrial Protocol) message and cause the PLC to become unresponsive, resulting in a denial-of-service condition. The vulnerability affects ControlLogix 5580 Process, ControlLogix 5580, GuardLogix 5580, CompactLogix 5380, CompactLogix 5480, Compact GuardLogix 5380 SIL 2, Compact GuardLogix 5380 SIL 3, and FactoryTalk Logix Echo in versions prior to the fixed releases. No special privileges or user interaction is required for exploitation.
- Network access to the PLC on port 2222 (Ethernet/IP) or direct CIP connectivity
- No authentication required to send CIP messages
Patching may require device reboot — plan for process interruption
/api/v1/advisories/58c456fa-16eb-4e94-9c82-717ba47ab47bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.