Lucene search

K

Guardlogix 5580 Firmware Security Vulnerabilities

cve
cve

CVE-2020-6998

The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop. This may allow an attacker to send specially crafted CIP packet requests to a ...

8.6CVSS

8.3AI Score

0.001EPSS

2022-07-27 09:15 PM
46
5
cve
cve

CVE-2022-1159

Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user.

7.7CVSS

7.5AI Score

0.001EPSS

2022-04-01 11:15 PM
64
cve
cve

CVE-2022-1161

An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change ...

10CVSS

9.4AI Score

0.001EPSS

2022-04-11 08:15 PM
93
2
cve
cve

CVE-2022-1797

A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload ...

8.6CVSS

8.4AI Score

0.001EPSS

2022-06-02 02:15 PM
45
5
cve
cve

CVE-2022-3752

An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy trafficloading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would ...

8.6CVSS

7.3AI Score

0.001EPSS

2022-12-19 11:15 PM
47
cve
cve

CVE-2024-6077

A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.

7.5CVSS

6.5AI Score

0.0004EPSS

2024-09-12 08:15 PM
25