Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Controllogix_5580_process_firmware
(Rockwellautomation)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-04-15 | CVE-2024-3493 | A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices. | 1756\-En4tr_firmware, Compact_guardlogix_5380_firmware, Compactlogix_5380_firmware, Compactlogix_5380_process_firmware, Compactlogix_5480_firmware, Controllogix_5580_firmware, Controllogix_5580_process_firmware, Guardlogix_5580_firmware | 7.5 | ||
2024-10-14 | CVE-2024-6207 | CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running. | Compact_guardlogix_5380_sil_2_firmware, Compact_guardlogix_5380_sil_3_firmware, Compactlogix_5380_firmware, Compactlogix_5480_firmware, Controllogix_5580_firmware, Controllogix_5580_process_firmware, Factorytalk_logix_echo_firmware, Guardlogix_5580_firmware | 7.5 |