First published: Tue Mar 26 2019(Updated: )
The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product’s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
RSLogix | ||
Rockwell Automation PLC-5 Controller | ||
Rockwell Automation PLC-5 Controller | ||
Rockwell Automation SLC 5/01 1747-L5x Firmware | ||
Rockwell Automation SLC 5/01 1747-L5x | ||
All of | ||
Rockwell Automation PLC-5 Controller | ||
Rockwell Automation PLC-5 Controller | ||
All of | ||
Rockwell Automation SLC 5/01 1747-L5x Firmware | ||
Rockwell Automation SLC 5/01 1747-L5x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-5305 is considered a high severity vulnerability due to the risk of unauthorized access to sensitive control systems.
To fix CVE-2010-5305, implement strong password policies and restrict access to the affected Rockwell Automation controllers.
CVE-2010-5305 affects Rockwell Automation RSLogix 1785-Lx and 1747-L5x controllers.
The potential consequences of CVE-2010-5305 include unauthorized programming and configuration alterations to critical industrial control systems.
There is no public indication that CVE-2010-5305 is actively exploited, but the potential for exploitation exists.