First published: Thu Mar 31 2022(Updated: )
An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change one and not the other.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
CompactLogix controllers | ||
CompactLogix controllers | ||
Rockwell Automation CompactLogix 5370 L1 controllers | ||
CompactLogix controllers | ||
CompactLogix controllers | ||
Rockwell Automation Armor Compact GuardLogix 5370 controllers | ||
Rockwell Automation Compact GuardLogix 5380 | ||
Rockwell Automation ControlLogix 5550 | ||
Rockwell Automation ControlLogix 5560 Controller firmware | ||
Rockwell Automation ControlLogix 5570 Controller | ||
Rockwell Automation ControlLogix 5580 Process | ||
Rockwell Automation GuardLogix | ||
Rockwell Automation GuardLogix Controllers | ||
Rockwell Automation GuardLogix Controllers | ||
Rockwell Automation FlexLogix 1794-L34 | ||
Rockwell Automation DriveLogix 5730 | ||
Rockwell Automation SoftLogix | ||
Rockwell Automation CompactLogix 1768-L43 Firmware | ||
Rockwell Automation CompactLogix 1768-L43 Firmware | ||
Rockwell Automation CompactLogix 1768-L45 | ||
Rockwell Automation CompactLogix 1768-L45 | ||
CompactLogix 1769-L31 Firmware | ||
Rockwell Automation CompactLogix 1769-L31 | ||
Rockwell Automation CompactLogix 1769-L32C Firmware | ||
Rockwell Automation CompactLogix 1769-L32C | ||
Rockwell Automation CompactLogix 1769-L32E Firmware | ||
Rockwell Automation CompactLogix 1769-L32E | ||
Rockwell Automation CompactLogix 1769-L35CR | ||
Rockwell Automation CompactLogix 1769-L35CR Firmware | ||
Rockwell Automation CompactLogix 1769-L35E Firmware | ||
Rockwell Automation CompactLogix 1769-L35E Firmware | ||
Rockwell Automation CompactLogix 5370 L3 Firmware | ||
Rockwell Automation CompactLogix 5370 L3 Firmware | ||
Rockwell Automation CompactLogix 5370 L2 Firmware | ||
Rockwell Automation CompactLogix 5370 L2 Firmware | ||
Rockwell Automation CompactLogix 5370 L1 firmware | ||
Rockwell Automation CompactLogix 5370 L1 firmware | ||
Rockwell Automation CompactLogix 5380 Firmware | ||
Rockwell Automation CompactLogix 5380 Firmware | ||
Rockwell Automation CompactLogix 5480 Firmware | ||
Rockwell Automation CompactLogix 5480 | ||
Rockwell Automation Compact GuardLogix 5370 Firmware | ||
Rockwell Automation Compact GuardLogix 5370 Firmware | ||
Rockwell Automation Compact GuardLogix 5380 SIL 3 Firmware | ||
Rockwell Automation Compact GuardLogix 5380 Firmware | ||
ControlLogix 5550 firmware | ||
Rockwell Automation ControlLogix 5550 | ||
ControlLogix 5560 firmware | ||
ControlLogix 5560 | ||
Rockwell Automation ControlLogix 5570 | ||
Rockwell Automation ControlLogix 5570 | ||
Rockwell Automation ControlLogix 5580 Firmware | ||
Rockwell Automation ControlLogix 5580 Firmware | ||
Rockwell Automation GuardLogix Firmware | ||
Rockwell Automation GuardLogix 5560 Firmware | ||
Rockwell Automation GuardLogix 5570 Controller firmware | ||
Rockwell Automation GuardLogix 5570 Controller firmware | ||
Rockwell Automation GuardLogix 5580 Firmware | ||
Rockwell Automation GuardLogix 5580 | ||
FLEXLogix firmware | ||
FLEXLogix firmware | ||
Rockwell Automation DriveLogix 5730 Firmware | ||
Rockwell Automation DriveLogix 5730 Firmware | ||
Rockwell Automation SoftLogix 5800 Firmware | ||
Rockwell Automation SoftLogix 5800 Controller |
The following mitigations should be applied for ControlLogix 5560, ControlLogix 5570, ControlLogix 5580 series, GuardLogix 5570, GuardLogix 5580, GuardLogix 5380, CompactLogix, CompactLogix 5380 devices: Risk Mitigation A: Recompile and download user program code (i.e., acd). Put controller mode switch into Run position. If keeping controller mode switch in Run is impractical, use the following mitigation: Recompile and download user program code (i.e., acd). Monitor controller change log for any unexpected modifications or anomalous activity. Utilize the Controller Log feature. Utilize Change Detection in the Logix Designer Application. If available, use the functionality in FactoryTalk AssetCenter software to detect changes. Risk Mitigation B: Implement CIP Security to help prevent unauthorized connections when properly deployed. Supported controllers and communications modules include: ControlLogix 5580 processors using on-board EtherNet/IP port. GuardLogix 5580 processors using on-board EtherNet/IP port. ControlLogix 5580 processors operating in High Availability (HA) configurations using 1756-EN4TR ControlLogix 5560, ControlLogix 5570, ControlLogix 5580, GuardLogix 5570 and GuardLogix 5580 can use a 1756-EN4TR ControlLogix EtherNet/IP module. If using a 1756-EN2T, then replace with a 1756-EN4TR CompactLogix 5380 using on-board EtherNet/IP port. CompactLogix GuardLogix 5380 using on-board EtherNet/IP port. The following mitigations should be applied for 1768 CompactLogix, 1769 CompactLogix, CompactLogix 5370, and CompactLogix 5480 devices: Recompile and download user program code (i.e., acd). Put controller mode switch into Run position. If keeping controller mode switch in Run is impractical, then use the following mitigation: Recompile and download user program code (i.e., acd). Monitor controller change log for any unexpected modifications or anomalous activity. Use the Controller Log feature. Use Change Detection in the Logix Designer application. If available, use the functionality in FactoryTalk AssetCenter to detect changes.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1161 is a vulnerability that allows an attacker to change user program code on certain Rockwell Automation Control systems.
CVE-2022-1161 has a severity rating of 9.8, which is classified as critical.
Rockwell Automation CompactLogix 1768-L43 is affected by CVE-2022-1161, allowing an attacker to change user program code.
To fix CVE-2022-1161, Rockwell Automation recommends applying the necessary security updates provided by the vendor.
You can find more information about CVE-2022-1161 on the official advisory from the Cybersecurity and Infrastructure Security Agency (CISA).