First published: Thu Sep 12 2024(Updated: )
A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Rockwell Automation CompactLogix 5380 Firmware | =32.011 | |
Rockwell Automation CompactLogix 5380 Firmware | ||
All of | ||
rockwellautomation Compact GuardLogix 5380 sil 2 | =32.013 | |
Rockwell Automation Compact GuardLogix 5380 SIL 2 | ||
All of | ||
Rockwell Automation Compact GuardLogix 5380 SIL 3 Firmware | =32.011 | |
Rockwell Automation Compact GuardLogix 5380 SIL 3 | ||
All of | ||
Rockwell Automation CompactLogix 5480 Firmware | =32.011 | |
Rockwell Automation CompactLogix 5480 | ||
All of | ||
Rockwell Automation ControlLogix 5580 Firmware | =33.011 | |
Rockwell Automation ControlLogix 5580 Firmware | ||
All of | ||
Rockwell Automation GuardLogix 5580 Firmware | =32.011 | |
Rockwell Automation GuardLogix 5580 | ||
All of | ||
Rockwell Automation 1756-EN4 Firmware | =2.001 | |
Rockwell Automation 1756-EN4 |
Affected Family First Known in Software/Firmware Version Corrected in Software/Firmware Version CompactLogix 5380 v.32 .011 v33.017, v34.014, v35.013, v36.011 and later CompactLogix 5380 Process v.33.011 v33.017, v34.014, v35.013, v36.011 and later Compact GuardLogix 5380 SIL 2 v.32.013 v33.017, v34.014, v35.013, v36.011 and later Compact GuardLogix 5380 SIL 3 v.32.011 v33.017, v34.014, v35.013, v36.011 and later CompactLogix 5480 v.32.011 v33.017, v34.014, v35.013, v36.011 and later ControlLogix® 5580 v.32.011 v33.017, v34.014, v35.013, v36.011 and later ControlLogix® 5580 Process v.33.011 v33.017, v34.014, v35.013, v36.011 and later GuardLogix 5580 v.32.011 v33.017, v34.014, v35.013, v36.011 and later 1756-EN4 v2.001 v6.001 and later Mitigations and Workarounds Customers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. * Users who do not wish to use CIP security can disable the feature per device. See "Disable CIP Security" in Chapter 2 of "CIP Security with Rockwell Automation Products" (publication SECURE-AT001) For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight to minimize the risk of the vulnerability. Customers can use Stakeholder-Specific Vulnerability Categorization https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc to generate more environment-specific prioritization.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6077 has a high severity rating due to its potential to cause denial-of-service conditions.
To mitigate CVE-2024-6077, upgrade the affected Rockwell Automation products to the latest firmware version provided by the vendor.
CVE-2024-6077 affects various Rockwell Automation products including CompactLogix 5380, GuardLogix 5380, and ControlLogix 5580 among others.
If exploited, CVE-2024-6077 can render the device unavailable, requiring a factory reset for recovery.
No, only specific versions of Rockwell Automation devices are vulnerable to CVE-2024-6077.