CVE-2024-6207

Oct. 21, 2024, 1:20 p.m.

CVSS Score

7.5 / 10

Products Impacted

Vendor Product Versions
rockwellautomation
  • controllogix_5580_firmware
  • controllogix_5580
  • controllogix_5580_process_firmware
  • controllogix_5580_process
  • guardlogix_5580_firmware
  • guardlogix_5580
  • compactlogix_5380_firmware
  • compactlogix_5380
  • compact_guardlogix_5380_sil_2_firmware
  • compact_guardlogix_5380_sil_2
  • compact_guardlogix_5380_sil_3_firmware
  • compact_guardlogix_5380_sil_3
  • compactlogix_5480_firmware
  • compactlogix_5480
  • factorytalk_logix_echo_firmware
  • factorytalk_logix_echo
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -

Description

CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.

Weaknesses

CWE-20
Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE ID: 20

Date

Published: Oct. 14, 2024, 9:15 p.m.

Last Modified: Oct. 21, 2024, 1:20 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

PSIRT@rockwellautomation.com

CPEs

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o rockwellautomation controllogix_5580_firmware / / / / / / / /
o rockwellautomation controllogix_5580_firmware / / / / / / / /
o rockwellautomation controllogix_5580_firmware / / / / / / / /
h rockwellautomation controllogix_5580 - / / / / / / /
o rockwellautomation controllogix_5580_process_firmware / / / / / / / /
o rockwellautomation controllogix_5580_process_firmware / / / / / / / /
o rockwellautomation controllogix_5580_process_firmware / / / / / / / /
h rockwellautomation controllogix_5580_process - / / / / / / /
o rockwellautomation guardlogix_5580_firmware / / / / / / / /
o rockwellautomation guardlogix_5580_firmware / / / / / / / /
o rockwellautomation guardlogix_5580_firmware / / / / / / / /
h rockwellautomation guardlogix_5580 - / / / / / / /
o rockwellautomation compactlogix_5380_firmware / / / / / / / /
o rockwellautomation compactlogix_5380_firmware / / / / / / / /
o rockwellautomation compactlogix_5380_firmware / / / / / / / /
h rockwellautomation compactlogix_5380 - / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_2_firmware / / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_2_firmware / / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_2_firmware / / / / / / / /
h rockwellautomation compact_guardlogix_5380_sil_2 - / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_3_firmware / / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_3_firmware / / / / / / / /
o rockwellautomation compact_guardlogix_5380_sil_3_firmware / / / / / / / /
h rockwellautomation compact_guardlogix_5380_sil_3 - / / / / / / /
o rockwellautomation compactlogix_5480_firmware / / / / / / / /
o rockwellautomation compactlogix_5480_firmware / / / / / / / /
o rockwellautomation compactlogix_5480_firmware / / / / / / / /
h rockwellautomation compactlogix_5480 - / / / / / / /
o rockwellautomation factorytalk_logix_echo_firmware / / / / / / / /
o rockwellautomation factorytalk_logix_echo_firmware / / / / / / / /
h rockwellautomation factorytalk_logix_echo - / / / / / / /

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

Base Score
7.5
Exploitability Score
3.9
Impact Score
3.6
Base Severity
HIGH
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References