Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown

CVE-2024-6207

Disclosure Date: October 14, 2024 (last updated October 22, 2024)
CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.
Attacker Value
Unknown

CVE-2024-6077

Disclosure Date: September 12, 2024 (last updated September 20, 2024)
A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.
Attacker Value
Unknown

CVE-2024-7515

Disclosure Date: August 14, 2024 (last updated August 15, 2024)
CVE-2024-7515 IMPACT A denial-of-service vulnerability exists in the affected products. A malformed PTP management packet can cause a major nonrecoverable fault in the controller.
0
Attacker Value
Unknown

CVE-2024-7507

Disclosure Date: August 14, 2024 (last updated August 15, 2024)
CVE-2024-7507 IMPACT A denial-of-service vulnerability exists in the affected products. This vulnerability occurs when a malformed PCCC message is received, causing a fault in the controller.
0
Attacker Value
Unknown

CVE-2024-40619

Disclosure Date: August 14, 2024 (last updated February 01, 2025)
CVE-2024-40619 IMPACT A denial-of-service vulnerability exists in the affected products. The vulnerability occurs when a malformed CIP packet is sent over the network to the device and results in a major nonrecoverable fault causing a denial-of-service.
Attacker Value
Unknown

CVE-2024-6242

Disclosure Date: August 01, 2024 (last updated August 02, 2024)
A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.
0
Attacker Value
Unknown

CVE-2024-5659

Disclosure Date: June 14, 2024 (last updated June 15, 2024)
Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the same network to result in a major nonrecoverable fault(MNRF/Assert). This vulnerability could be exploited by sending abnormal packets to the mDNS port. If exploited, the availability of the device would be compromised.
0
Attacker Value
Unknown

CVE-2024-3493

Disclosure Date: April 15, 2024 (last updated April 16, 2024)
A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices.
0
Attacker Value
Unknown

CVE-2020-6998

Disclosure Date: July 27, 2022 (last updated October 07, 2023)
The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop. This may allow an attacker to send specially crafted CIP packet requests to a controller, which may cause denial-of-service conditions in communications with other products.
Attacker Value
Unknown

CVE-2022-1797

Disclosure Date: June 02, 2022 (last updated October 07, 2023)
A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online.