CVE-2024-6207

Oct. 21, 2024, 1:20 p.m.

7.5
High

Description

CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.

Product(s) Impacted

Vendor Product Versions
Rockwellautomation
  • Controllogix 5580 Firmware
  • Controllogix 5580
  • Controllogix 5580 Process Firmware
  • Controllogix 5580 Process
  • Guardlogix 5580 Firmware
  • Guardlogix 5580
  • Compactlogix 5380 Firmware
  • Compactlogix 5380
  • Compact Guardlogix 5380 Sil 2 Firmware
  • Compact Guardlogix 5380 Sil 2
  • Compact Guardlogix 5380 Sil 3 Firmware
  • Compact Guardlogix 5380 Sil 3
  • Compactlogix 5480 Firmware
  • Compactlogix 5480
  • Factorytalk Logix Echo Firmware
  • Factorytalk Logix Echo
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-20
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o rockwellautomation controllogix_5580_firmware / / / / / / / /
o rockwellautomation controllogix_5580_firmware / / / / / / / /
o rockwellautomation controllogix_5580_firmware / / / / / / / /
h rockwellautomation controllogix_5580 - / / / / / / /
o rockwellautomation controllogix_5580_process_firmware / / / / / / / /
o rockwellautomation controllogix_5580_process_firmware / / / / / / / /
o rockwellautomation controllogix_5580_process_firmware / / / / / / / /
h rockwellautomation controllogix_5580_process - / / / / / / /
o rockwellautomation guardlogix_5580_firmware / / / / / / / /
o rockwellautomation guardlogix_5580_firmware / / / / / / / /
o rockwellautomation guardlogix_5580_firmware / / / / / / / /
h rockwellautomation guardlogix_5580 - / / / / / / /
o rockwellautomation compactlogix_5380_firmware / / / / / / / /
o rockwellautomation compactlogix_5380_firmware / / / / / / / /
o rockwellautomation compactlogix_5380_firmware / / / / / / / /
h rockwellautomation compactlogix_5380 - / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_2_firmware / / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_2_firmware / / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_2_firmware / / / / / / / /
h rockwellautomation compact_guardlogix_5380_sil_2 - / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_3_firmware / / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_3_firmware / / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_3_firmware / / / / / / / /
h rockwellautomation compact_guardlogix_5380_sil_3 - / / / / / / /
o rockwellautomation compactlogix_5480_firmware / / / / / / / /
o rockwellautomation compactlogix_5480_firmware / / / / / / / /
o rockwellautomation compactlogix_5480_firmware / / / / / / / /
h rockwellautomation compactlogix_5480 - / / / / / / /
o rockwellautomation factorytalk_logix_echo_firmware / / / / / / / /
o rockwellautomation factorytalk_logix_echo_firmware / / / / / / / /
h rockwellautomation factorytalk_logix_echo - / / / / / / /

CVSS Score

7.5 / 10

CVSS Data

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • View Vector String

    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Date

  • Published: Oct. 14, 2024, 9:15 p.m.
  • Last Modified: Oct. 21, 2024, 1:20 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

PSIRT@rockwellautomation.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.