Rockwell Automation Stratix IOS
Stratix IOS contains a vulnerability that allows an attacker to inject and execute malicious configurations without authentication. The vulnerability affects Stratix IOS versions 15.28E5 and earlier and can be exploited remotely via the web interface. A variant affecting all Stratix IOS versions using cross-site request forgery (CSRF) has no planned fix. Successful exploitation allows complete configuration override, which could disrupt network connectivity or enable unauthorized access to industrial devices.
- Network access to the Stratix IOS web interface (HTTP/HTTPS port)
- In some cases, a user with access to the web interface must be tricked into visiting an attacker-controlled website while logged in to the Stratix
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e2912bc5-1f30-4f03-8072-a66d3ce61587Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.