Lucene search

K
nvd[email protected]NVD:CVE-2022-1161
HistoryApr 11, 2022 - 8:15 p.m.

CVE-2022-1161

2022-04-1120:15:18
CWE-829
web.nvd.nist.gov
6
attacker
controllogix
compactlogix
guardlogix

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

41.5%

An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change one and not the other.

Affected configurations

Nvd
Node
rockwellautomationcompactlogix_1768-l43Match-
AND
rockwellautomationcompactlogix_1768-l43_firmware
Node
rockwellautomationcompactlogix_1768-l45Match-
AND
rockwellautomationcompactlogix_1768-l45_firmware
Node
rockwellautomationcompactlogix_1769-l31Match-
AND
rockwellautomationcompactlogix_1769-l31_firmware
Node
rockwellautomationcompactlogix_1769-l32cMatch-
AND
rockwellautomationcompactlogix_1769-l32c_firmware
Node
rockwellautomationcompactlogix_1769-l32eMatch-
AND
rockwellautomationcompactlogix_1769-l32e_firmware
Node
rockwellautomationcompactlogix_1769-l35crMatch-
AND
rockwellautomationcompactlogix_1769-l35cr_firmware
Node
rockwellautomationcompactlogix_1769-l35eMatch-
AND
rockwellautomationcompactlogix_1769-l35e_firmware
Node
rockwellautomationcompactlogix_5370_l3Match-
AND
rockwellautomationcompactlogix_5370_l3_firmware
Node
rockwellautomationcompactlogix_5370_l2_firmware
AND
rockwellautomationcompactlogix_5370_l2Match-
Node
rockwellautomationcompactlogix_5370_l1_firmware
AND
rockwellautomationcompactlogix_5370_l1Match-
Node
rockwellautomationcompactlogix_5380_firmware
AND
rockwellautomationcompactlogix_5380Match-
Node
rockwellautomationcompactlogix_5480_firmware
AND
rockwellautomationcompactlogix_5480Match-
Node
rockwellautomationcompact_guardlogix_5370_firmware
AND
rockwellautomationcompact_guardlogix_5370Match-
Node
rockwellautomationcompact_guardlogix_5380_firmware
AND
rockwellautomationcompact_guardlogix_5380Match-
Node
rockwellautomationcontrollogix_5550_firmware
AND
rockwellautomationcontrollogix_5550Match-
Node
rockwellautomationcontrollogix_5560_firmware
AND
rockwellautomationcontrollogix_5560Match-
Node
rockwellautomationcontrollogix_5570_firmware
AND
rockwellautomationcontrollogix_5570Match-
Node
rockwellautomationcontrollogix_5580_firmware
AND
rockwellautomationcontrollogix_5580Match-
Node
rockwellautomationguardlogix_5560_firmware
AND
rockwellautomationguardlogix_5560Match-
Node
rockwellautomationguardlogix_5570_firmware
AND
rockwellautomationguardlogix_5570Match-
Node
rockwellautomationguardlogix_5580_firmware
AND
rockwellautomationguardlogix_5580Match-
Node
rockwellautomationflexlogix_1794-l34_firmware
AND
rockwellautomationflexlogix_1794-l34Match-
Node
rockwellautomationdrivelogix_5730_firmware
AND
rockwellautomationdrivelogix_5730Match-
Node
rockwellautomationsoftlogix_5800_firmware
AND
rockwellautomationsoftlogix_5800Match-

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

41.5%