Rockwell Automation Lifecycle Services with Cisco
Rockwell Automation Lifecycle Services with Cisco integrations (Industrial Data Center and managed support contracts) contain a buffer overflow vulnerability in handling user input, allowing authenticated users to execute arbitrary code. Affected are IDC Generations 1–5, IDC-Managed Support, Network-Managed Support (all versions), and Firewall-Managed Support contracts (all versions). The vulnerability has a CVSS score of 7.7 and is actively being exploited in the wild. Rockwell Automation has stated no firmware fix will be available; users must rely on network isolation, access controls, and Cisco-provided workarounds.
- Valid user credentials for Rockwell Automation Lifecycle Services
- Network access to the affected Lifecycle Services platform (typically internal or over managed VPN)
- The affected product must be running Generations 1–5 (IDC variants) or any version of Network/Firewall-Managed Support contracts
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8df6d378-d2ee-42d7-b6c5-5356a28061abGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.