Lucene search

K
RockwellautomationCompact Guardlogix 5380 Firmware*

6 matches found

CVE
CVE
added 2022/04/11 8:15 p.m.132 views

CVE-2022-1161

An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change ...

10CVSS8.1AI score0.00317EPSS
CVE
CVE
added 2022/04/01 11:15 p.m.99 views

CVE-2022-1159

Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user.

7.7CVSS7.5AI score0.00019EPSS
CVE
CVE
added 2022/06/02 2:15 p.m.71 views

CVE-2022-1797

A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload ...

8.6CVSS7.4AI score0.00029EPSS
CVE
CVE
added 2022/12/19 11:15 p.m.64 views

CVE-2022-3752

An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy trafficloading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would ...

8.6CVSS7.6AI score0.00347EPSS
CVE
CVE
added 2022/12/16 9:15 p.m.63 views

CVE-2022-3157

A vulnerability exists in the Rockwell Automation controllers that allows a malformed CIP request to cause a major non-recoverable fault (MNRF) and a denial-of-service condition (DOS).

8.6CVSS7.9AI score0.00594EPSS
CVE
CVE
added 2024/10/08 5:15 p.m.37 views

CVE-2024-8626

Due to a memory leak, a denial-of-service vulnerability exists in the Rockwell Automation affected products. A malicious actor could exploit this vulnerability by performing multiple actions on certain web pages of the product causing the affected products to become fully unavailable and require a ...

8.7CVSS6.4AI score0.00112EPSS