CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
26.4%
An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic
loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload
the user project file to bring the device back online and continue normal operation.
Vendor | Product | Version | CPE |
---|---|---|---|
rockwellautomation | compactlogix_5480 | - | cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:* |
rockwellautomation | compactlogix_5480_firmware | * | cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:* |
rockwellautomation | compactlogix_5580 | - | cpe:2.3:h:rockwellautomation:compactlogix_5580:-:*:*:*:*:*:*:* |
rockwellautomation | compactlogix_5580_firmware | * | cpe:2.3:o:rockwellautomation:compactlogix_5580_firmware:*:*:*:*:*:*:*:* |
rockwellautomation | guardlogix_5580 | - | cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:* |
rockwellautomation | guardlogix_5580_firmware | * | cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:* |
rockwellautomation | compact_guardlogix_5380 | - | cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:* |
rockwellautomation | compact_guardlogix_5380_firmware | * | cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:*:*:*:*:*:*:*:* |
rockwellautomation | compactlogix_5380 | - | cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:* |
rockwellautomation | compactlogix_5380_firmware | * | cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:* |