First published: Fri Jun 14 2024(Updated: )
Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the same network to result in a major nonrecoverable fault(MNRF/Assert). This vulnerability could be exploited by sending abnormal packets to the mDNS port. If exploited, the availability of the device would be compromised.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Rockwell Automation ControlLogix 5580 Firmware | =34.011 | |
Rockwell Automation ControlLogix 5580 Firmware | ||
All of | ||
Rockwell Automation GuardLogix 5580 Firmware | =34.011 | |
Rockwell Automation GuardLogix 5580 | ||
All of | ||
Rockwell Automation 1756-EN4 Firmware | =4.001 | |
Rockwell Automation 1756-EN4 | ||
All of | ||
Rockwell Automation CompactLogix 5380 Firmware | =34.011 | |
Rockwell Automation CompactLogix 5380 Firmware | ||
All of | ||
Rockwell Automation Compact GuardLogix 5380 SIL 3 Firmware | =34.011 | |
Rockwell Automation Compact GuardLogix 5380 Firmware | ||
All of | ||
Rockwell Automation CompactLogix 5480 Firmware | =34.011 | |
Rockwell Automation CompactLogix 5480 | ||
Rockwell Automation Select Controllers |
Affected Product First Known in firmware revision Corrected in firmware revision ControlLogix® 5580 V34.011 V34.014, V35.013, V36.011 and later GuardLogix 5580 V34.011 V34.014, V35.013, V36.011 and later 1756-EN4 V4.001 V6.001 and later CompactLogix 5380 V34.011 V34.014, V35.013, V36.011 and later Compact GuardLogix 5380 V34.011 V34.014, V35.013, V36.011 and later CompactLogix 5480 V34.011 V34.014, V35.013, V36.011 and later Mitigations and Workarounds Users using the affected software and who are not able to upgrade to one of the corrected versions are encouraged to apply the risk mitigations, where possible. · Users who do not use CIP Security with Rockwell Automation Products Application Technique https://literature.rockwellautomation.com/idc/groups/literature/documents/at/secure-at001_-en-p.pdf · Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5659 is classified as a critical vulnerability due to its potential to cause major nonrecoverable faults in affected Rockwell Automation controllers.
To mitigate CVE-2024-5659, immediately apply the recommended software updates and patches provided by Rockwell Automation for the Select Controllers.
CVE-2024-5659 affects Rockwell Automation Select Controllers on the same network.
Exploitation of CVE-2024-5659 could lead to a significant availability impact, resulting in controllers experiencing a major nonrecoverable fault.
Yes, CVE-2024-5659 can be exploited remotely by sending abnormal packets to the mDNS port of the affected controllers.