CVE-2024-6242
Aug. 1, 2024, 4:45 p.m.
None
No Score
Description
A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.
Product(s) Impacted
Product | Versions |
---|---|
Rockwell Automation ControlLogix controller |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
CWE-420
Unprotected Alternate Channel
The product protects a primary channel, but it does not use the same level of protection for an alternate channel.
Tags
Timeline
Published: Aug. 1, 2024, 4:15 p.m.
Last Modified: Aug. 1, 2024, 4:45 p.m.
Last Modified: Aug. 1, 2024, 4:45 p.m.
Status : Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
More infoSource
PSIRT@rockwellautomation.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.