First published: Wed Aug 14 2024(Updated: )
CVE-2024-40619 IMPACT A denial-of-service vulnerability exists in the affected products. The vulnerability occurs when a malformed CIP packet is sent over the network to the device and results in a major nonrecoverable fault causing a denial-of-service.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Rockwell Automation ControlLogix 5580 Firmware | =34.011 | |
Rockwell Automation ControlLogix 5580 Firmware | ||
All of | ||
Rockwell Automation GuardLogix 5580 Firmware | =34.011 | |
Rockwell Automation GuardLogix 5580 |
Upgrade to v34.014 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40619 is classified as a denial-of-service vulnerability that can lead to a major nonrecoverable fault.
To mitigate CVE-2024-40619, it is essential to apply the latest firmware updates provided by Rockwell Automation for affected devices.
CVE-2024-40619 affects the Rockwell Automation GuardLogix/ControlLogix 5580 Controller and specific firmware versions.
The denial-of-service in CVE-2024-40619 is triggered by the receipt of a malformed CIP packet sent to the device.
Currently, the recommended approach to address CVE-2024-40619 is to ensure device firmware is updated to the latest version.