Show plain JSON{"containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "PLC5", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "1785-Lx"}, {"status": "affected", "version": "1747-L5x"}]}, {"defaultStatus": "unaffected", "product": "SLC5/0x", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "1785-Lx"}, {"status": "affected", "version": "1747-L5x"}]}, {"defaultStatus": "unaffected", "product": "RSLogix", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2010-03-10T07:00:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product\u2019s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services.</p>"}], "value": "The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product\u2019s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services."}], "problemTypes": [{"descriptions": [{"cweId": "CWE-255", "description": "Credentials management CWE-255", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert", "dateUpdated": "2025-06-26T17:05:54.602Z"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-10-070-02"}, {"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/66684/kw/vulnerability/r_id/115100"}], "source": {"advisory": "ICSA-10-070-02", "discovery": "INTERNAL"}, "title": "Rockwell PLC5/SLC5/0x/RSLogix Credentials management", "workarounds": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>To help reduce the likelihood of exploitation and associated security risk, Rockwell Automation recommends the following immediate mitigation strategies (Note: multiple strategies are recommended to be employed simultaneously):</p><ol><li>For PLC-5 controllers, enable and configure \"Passwords and Privileges\" via RSLogix 5 configuration software to restrict access to critical data and improve overall password security.</li><li>When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services. This functionality can be enabled via RSLogix 5 or RSLogix 500 software. (Consult Rockwell TechnoteRockwell Technote, <a target=\"_blank\" rel=\"nofollow\" href=\"http://rockwellautomation.custhelp.com/app/answers/detail/a_id/66678/kw/vulnerability/r_id/115100\">http://rockwellautomation.custhelp.com/app/answers/detail/a_id/66678/kw/vulnerability/r_id/115100</a>, website last accessed January 12, 2010 for applicable firmware versions)</li><li>Use the latest version of RSLogix 5 or RSLogix 500 configuration software and enable FactoryTalk Security services.</li><li>Disable where possible the capability to perform remote programming and configuration of the product over a network to a controller by placing the controller's key switch into RUN mode.</li><li>For SLC controllers, enable static protection on all critical data table files to prevent any remote data changes to critical data.</li><li>Employ layered security and defense-in-depth methods in system design to restrict and control access to individual products and control networks. Refer to <a target=\"_blank\" rel=\"nofollow\" href=\"http://www.ab.com/networks/architectures.html\">http://www.ab.com/networks/architectures.html</a> for comprehensive information about implementing validated architectures designed to deliver these measures.</li><li>Block all traffic to the CSP, Ethernet/IP, or other CIP protocol-based devices from outside the Manufacturing Zone by restricting or blocking access to TCP and UDP Port 2222 and Port 44818 using appropriate security technology (e.g., a firewall, UTM devices, or other security device).</li><li>Restrict physical and electronic access to automation products, networks, and systems to only those individuals authorized to make changes to control system equipment.</li><li>Frequently change the product\u2019s password and obsolete previously used passwords to reduceexposure to threat from a product password becoming known.</li></ol>\n\n<br>"}], "value": "To help reduce the likelihood of exploitation and associated security risk, Rockwell Automation recommends the following immediate mitigation strategies (Note: multiple strategies are recommended to be employed simultaneously):\n\n * For PLC-5 controllers, enable and configure \"Passwords and Privileges\" via RSLogix 5 configuration software to restrict access to critical data and improve overall password security.\n * When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services. This functionality can be enabled via RSLogix 5 or RSLogix 500 software. (Consult Rockwell TechnoteRockwell Technote, http://rockwellautomation.custhelp.com/app/answers/detail/a_id/66678/kw/vulnerability/r_id/115100 , website last accessed January 12, 2010 for applicable firmware versions)\n * Use the latest version of RSLogix 5 or RSLogix 500 configuration software and enable FactoryTalk Security services.\n * Disable where possible the capability to perform remote programming and configuration of the product over a network to a controller by placing the controller's key switch into RUN mode.\n * For SLC controllers, enable static protection on all critical data table files to prevent any remote data changes to critical data.\n * Employ layered security and defense-in-depth methods in system design to restrict and control access to individual products and control networks. Refer to http://www.ab.com/networks/architectures.html for comprehensive information about implementing validated architectures designed to deliver these measures.\n * Block all traffic to the CSP, Ethernet/IP, or other CIP protocol-based devices from outside the Manufacturing Zone by restricting or blocking access to TCP and UDP Port 2222 and Port 44818 using appropriate security technology (e.g., a firewall, UTM devices, or other security device).\n * Restrict physical and electronic access to automation products, networks, and systems to only those individuals authorized to make changes to control system equipment.\n * Frequently change the product\u2019s password and obsolete previously used passwords to reduceexposure to threat from a product password becoming known."}], "x_generator": {"engine": "Vulnogram 0.2.0"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2010-5305", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "PLC5", "version": {"version_data": [{"version_value": "1785-Lx"}, {"version_value": "1747-L5x"}]}}, {"product_name": "SLC5/0x", "version": {"version_data": [{"version_value": "n/a"}]}}, {"product_name": "RSLogix", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "Rockwell Automation"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product\u2019s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Credentials management CWE-255"}]}]}, "references": {"reference_data": [{"name": "https://ics-cert.us-cert.gov/advisories/ICSA-10-070-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-10-070-02"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-07T04:17:10.399Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-10-070-02"}]}]}, "cveMetadata": {"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2010-5305", "datePublished": "2019-03-26T17:24:25", "dateReserved": "2014-09-03T00:00:00", "dateUpdated": "2025-06-26T17:05:54.602Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}