Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03 - Third Party Advisory, US Government Resource |
Information
Published : 2021-03-03 18:15
Updated : 2024-11-21 05:50
NVD link : CVE-2021-22681
Mitre link : CVE-2021-22681
CVE.ORG link : CVE-2021-22681
JSON object : View
Products Affected
rockwellautomation
- compactlogix_5370
- drivelogix_5560
- studio_5000_logix_designer
- compactlogix_5380
- factorytalk_services_platform
- controllogix_5570
- guardlogix_5580
- drivelogix_1794-l34
- controllogix_5550
- compactlogix_1769
- drivelogix_5730
- compactlogix_5480
- guardlogix_5570
- compact_guardlogix_5370
- controllogix_5580
- softlogix_5800
- compact_guardlogix_5380
- compactlogix_1768
- rslogix_5000
- controllogix_5560
CWE
CWE-522
Insufficiently Protected Credentials