First published: Fri Apr 01 2022(Updated: )
Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Controllogix 5580 Firmware | ||
Rockwellautomation Controllogix 5580 | ||
Rockwellautomation Guardlogix 5580 Firmware | ||
Rockwellautomation Guardlogix 5580 | ||
Rockwellautomation Compactlogix 5380 Firmware | ||
Rockwellautomation Compactlogix 5380 | ||
Rockwellautomation Compactlogix 5480 Firmware | ||
Rockwellautomation Compactlogix 5480 | ||
Rockwellautomation Compact Guardlogix 5380 Firmware | ||
Rockwellautomation Compact Guardlogix 5380 | ||
Rockwell Automation ControlLogix 5580 controllers | ||
Rockwell Automation GuardLogix 5580 controllers | ||
Rockwell Automation CompactLogix 5380 controllers | ||
Rockwell Automation CompactLogix 5480 controllers | ||
Rockwell Automation Compact GuardLogix 5380 controllers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1159 is a vulnerability in Rockwell Automation Studio 5000 Logix Designer that allows an attacker who achieves administrator access to inject controller code undetectable to a user.
CVE-2022-1159 has a severity rating of 7.2 (high).
All versions of Rockwell Automation Studio 5000 Logix Designer are vulnerable to CVE-2022-1159.
An attacker with administrator access on a workstation running Studio 5000 Logix Designer can inject controller code that is undetectable to a user.
At the moment, there is no fix available for CVE-2022-1159. It is recommended to follow the mitigation steps provided by Rockwell Automation and monitor for any updates from the vendor.