Rockwell Automation GuardLogix 5380 and 5580 (Update A)
Rockwell Automation GuardLogix 5380 and 5580 safety controllers contain a vulnerability allowing a remote, non-privileged user to send malicious CIP requests that cause a major nonrecoverable fault and denial-of-service condition. Affected versions include V33.017, V34.014, V35.013, and V36.011 for both controller models with SIL 3 safety partner 3 configuration. The vulnerability has a CVSS score of 6.5 (medium severity) and does not require authentication if CIP Security is not enabled. No patch is currently available from the vendor.
- Network access to CIP port (2222 default) on the GuardLogix controller
- No credentials required to send CIP requests if CIP Security is not enabled
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f086293f-231a-4f0b-8a6f-ca0defe0379dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.