CVE-2021-22681

Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03 Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:rockwellautomation:factorytalk_services_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:rslogix_5000:*:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:studio_5000_logix_designer:*:*:*:*:*:*:*:*
OR cpe:2.3:h:rockwellautomation:compact_guardlogix_5370:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix_1768:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix_1769:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix_5370:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:controllogix_5550:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:controllogix_5560:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:controllogix_5570:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:drivelogix_1794-l34:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:drivelogix_5560:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:drivelogix_5730:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:guardlogix_5570:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:softlogix_5800:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:50

Type Values Removed Values Added
References () https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03 - Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03 - Third Party Advisory, US Government Resource

Information

Published : 2021-03-03 18:15

Updated : 2024-11-21 05:50


NVD link : CVE-2021-22681

Mitre link : CVE-2021-22681

CVE.ORG link : CVE-2021-22681


JSON object : View

Products Affected

rockwellautomation

  • compactlogix_5370
  • drivelogix_5560
  • studio_5000_logix_designer
  • compactlogix_5380
  • factorytalk_services_platform
  • controllogix_5570
  • guardlogix_5580
  • drivelogix_1794-l34
  • controllogix_5550
  • compactlogix_1769
  • drivelogix_5730
  • compactlogix_5480
  • guardlogix_5570
  • compact_guardlogix_5370
  • controllogix_5580
  • softlogix_5800
  • compact_guardlogix_5380
  • compactlogix_1768
  • rslogix_5000
  • controllogix_5560
CWE
CWE-522

Insufficiently Protected Credentials