Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-6077", "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "state": "PUBLISHED", "assignerShortName": "Rockwell", "dateReserved": "2024-06-17T16:21:32.155Z", "datePublished": "2024-09-12T19:59:40.368Z", "dateUpdated": "2024-09-12T21:01:50.254Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "CompactLogix 5380", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "v.32 .011"}]}, {"defaultStatus": "unaffected", "product": "CompactLogix 5380 Process", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "v.33.011"}]}, {"defaultStatus": "unaffected", "product": "Compact GuardLogix 5380 SIL 2", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "v.32.013"}]}, {"defaultStatus": "unaffected", "product": "Compact GuardLogix 5380 SIL 3", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "v.32.011"}]}, {"defaultStatus": "unaffected", "product": "CompactLogix 5480", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "v.32.011"}]}, {"defaultStatus": "unaffected", "product": "ControlLogix\u00ae 5580", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "v.32.011"}]}, {"defaultStatus": "unaffected", "product": "ControlLogix\u00ae 5580 Process", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "v.33.011"}]}, {"defaultStatus": "unaffected", "product": "GuardLogix 5580", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "v.32.011"}]}, {"defaultStatus": "unaffected", "product": "1756-EN4", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "v2.001"}]}], "datePublic": "2024-09-12T13:00:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<span style=\"background-color: rgb(255, 255, 255);\">A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover. </span>"}], "value": "A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover."}], "impacts": [{"capecId": "CAPEC-153", "descriptions": [{"lang": "en", "value": "CAPEC-153 Input Data Manipulation"}]}], "metrics": [{"cvssV4_0": {"Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell", "dateUpdated": "2024-09-12T20:07:19.806Z"}, "references": [{"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1963.html"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<table><tbody><tr><td><p>Affected Family </p><p> </p><p> </p></td><td><p> </p><p> </p><p>First Known in Software/Firmware Version</p><p> </p><p> </p></td><td><p> </p><p> </p><p>Corrected in Software/Firmware Version</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>CompactLogix 5380</p><p> </p><p> </p><p> </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32 .011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>CompactLogix 5380 Process </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.33.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>Compact GuardLogix 5380 SIL 2 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.013</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>Compact GuardLogix 5380 SIL 3 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>CompactLogix 5480 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>ControlLogix\u00ae 5580 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>ControlLogix\u00ae 5580 Process </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.33.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>GuardLogix 5580 </p><p> </p><p> </p></td><td><p> </p><p> </p><p>v.32.011</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p> </p><p> </p></td></tr><tr><td><p> </p><p> </p><p>1756-EN4</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v2.001</p><p> </p><p> </p></td><td><p> </p><p> </p><p>v6.001 and later</p><p> </p><p> </p></td></tr></tbody></table><p> </p>\n\n\n\n<p>Mitigations and Workarounds <br>Customers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. </p><ul><li><p>Users who do not wish to use CIP security can disable the feature per device. See \"Disable CIP Security\" in Chapter 2 of \"CIP Security with Rockwell Automation Products\" (publication SECURE-AT001)</p></li></ul><p>For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested <a target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\">security best practices</a> to minimize the risk of the vulnerability. Customers can use <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc\">Stakeholder-Specific Vulnerability Categorization</a> to generate more environment-specific prioritization.</p>\n\n<br>"}], "value": "Affected Family \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nFirst Known in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCorrected in Software/Firmware Version\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32 .011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5380 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 2 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.013\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompact GuardLogix 5380 SIL 3 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nCompactLogix 5480 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nControlLogix\u00ae 5580 Process \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.33.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nGuardLogix 5580 \n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv.32.011\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv33.017, v34.014, v35.013, v36.011 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n1756-EN4\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv2.001\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\nv6.001 and later\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\n\n\n\nMitigations and Workarounds \nCustomers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. \n\n * Users who do not wish to use CIP security can disable the feature per device. See \"Disable CIP Security\" in Chapter 2 of \"CIP Security with Rockwell Automation Products\" (publication SECURE-AT001)\n\n\n\n\nFor information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight \u00a0to minimize the risk of the vulnerability. Customers can use Stakeholder-Specific Vulnerability Categorization https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc \u00a0to generate more environment-specific prioritization."}], "source": {"advisory": "SD1963", "discovery": "INTERNAL"}, "title": "Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix\u00ae 5380 Vulnerable to DoS vulnerability via CIP", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"affected": [{"vendor": "rockwellautomation", "product": "compactlogix_5480_firmware", "cpes": ["cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "32 .011", "status": "affected", "lessThan": "33.017", "versionType": "custom"}, {"version": "34.0", "status": "affected", "lessThan": "34.014", "versionType": "custom"}, {"version": "35.0", "status": "affected", "lessThan": "35.013", "versionType": "custom"}, {"version": "36.0", "status": "affected", "lessThan": "36.011", "versionType": "custom"}]}, {"vendor": "rockwellautomation", "product": "compactlogix_5380_process_firmware", "cpes": ["cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5380_process_firmware:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "33.011", "status": "affected", "lessThan": "33.017", "versionType": "custom"}, {"version": "34.0", "status": "affected", "lessThan": "34.014", "versionType": "custom"}, {"version": "35.0", "status": "affected", "lessThan": "35.013", "versionType": "custom"}, {"version": "36.0", "status": "affected", "lessThan": "36.011", "versionType": "custom"}]}, {"vendor": "rockwellautomation", "product": "compact_guardlogix_5380_sil2_firmware", "cpes": ["cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil2_firmware:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "32.013", "status": "affected", "lessThan": "33.017", "versionType": "custom"}, {"version": "34.0", "status": "affected", "lessThan": "34.014", "versionType": "custom"}, {"version": "35.0", "status": "affected", "lessThan": "35.013", "versionType": "custom"}, {"version": "36.0", "status": "affected", "lessThan": "36.011", "versionType": "custom"}]}, {"vendor": "rockwellautomation", "product": "1756-en4_firmware", "cpes": ["cpe:2.3:o:rockwellautomation:1756-en4_firmware:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "2.001", "status": "affected", "lessThan": "6.001", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-12T20:22:58.224200Z", "id": "CVE-2024-6077", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-12T21:01:50.254Z"}}]}}