{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-6077","assignerOrgId":"b73dd486-f505-4403-b634-40b078b177f0","state":"PUBLISHED","assignerShortName":"Rockwell","dateReserved":"2024-06-17T16:21:32.155Z","datePublished":"2024-09-12T19:59:40.368Z","dateUpdated":"2024-09-12T21:01:50.254Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"CompactLogix 5380","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"v.32 .011"}]},{"defaultStatus":"unaffected","product":"CompactLogix 5380 Process","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"v.33.011"}]},{"defaultStatus":"unaffected","product":"Compact GuardLogix 5380 SIL 2","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"v.32.013"}]},{"defaultStatus":"unaffected","product":"Compact GuardLogix 5380 SIL 3","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"v.32.011"}]},{"defaultStatus":"unaffected","product":"CompactLogix 5480","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"v.32.011"}]},{"defaultStatus":"unaffected","product":"ControlLogix® 5580","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"v.32.011"}]},{"defaultStatus":"unaffected","product":"ControlLogix® 5580 Process","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"v.33.011"}]},{"defaultStatus":"unaffected","product":"GuardLogix 5580","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"v.32.011"}]},{"defaultStatus":"unaffected","product":"1756-EN4","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"v2.001"}]}],"datePublic":"2024-09-12T13:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover. </span>"}],"value":"A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover."}],"impacts":[{"capecId":"CAPEC-153","descriptions":[{"lang":"en","value":"CAPEC-153 Input Data Manipulation"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"b73dd486-f505-4403-b634-40b078b177f0","shortName":"Rockwell","dateUpdated":"2024-09-12T20:07:19.806Z"},"references":[{"url":"https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1963.html"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<table><tbody><tr><td><p>Affected Family </p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>First Known in Software/Firmware Version</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>Corrected in Software/Firmware Version</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>CompactLogix 5380</p><p>&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v.32 .011</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>CompactLogix 5380 Process </p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v.33.011</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>Compact GuardLogix 5380 SIL 2 </p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v.32.013</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>Compact GuardLogix 5380 SIL 3 </p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v.32.011</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>CompactLogix 5480 </p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v.32.011</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>ControlLogix® 5580 </p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v.32.011</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>ControlLogix® 5580 Process </p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v.33.011</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>GuardLogix 5580 </p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v.32.011</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v33.017, v34.014, v35.013, v36.011 and later</p><p>&nbsp;</p><p>&nbsp;</p></td></tr><tr><td><p>&nbsp;</p><p>&nbsp;</p><p>1756-EN4</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v2.001</p><p>&nbsp;</p><p>&nbsp;</p></td><td><p>&nbsp;</p><p>&nbsp;</p><p>v6.001 and later</p><p>&nbsp;</p><p>&nbsp;</p></td></tr></tbody></table><p>&nbsp;</p>\n\n\n\n<p>Mitigations and Workarounds <br>Customers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. </p><ul><li><p>Users who do not wish to use CIP security can disable the feature per device. See \"Disable CIP Security\" in Chapter 2 of \"CIP Security with Rockwell Automation Products\" (publication SECURE-AT001)</p></li></ul><p>For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested <a target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\">security best practices</a>&nbsp;to minimize the risk of the vulnerability. Customers can use <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc\">Stakeholder-Specific Vulnerability Categorization</a>&nbsp;to generate more environment-specific prioritization.</p>\n\n<br>"}],"value":"Affected Family \n\n \n\n \n\n \n\n \n\nFirst Known in Software/Firmware Version\n\n \n\n \n\n \n\n \n\nCorrected in Software/Firmware Version\n\n \n\n \n\n \n\n \n\nCompactLogix 5380\n\n \n\n \n\n \n\n \n\n \n\n \n\n \n\nv.32 .011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompactLogix 5380 Process \n\n \n\n \n\n \n\n \n\nv.33.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompact GuardLogix 5380 SIL 2 \n\n \n\n \n\n \n\n \n\nv.32.013\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompact GuardLogix 5380 SIL 3 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nCompactLogix 5480 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nControlLogix® 5580 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nControlLogix® 5580 Process \n\n \n\n \n\n \n\n \n\nv.33.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\nGuardLogix 5580 \n\n \n\n \n\n \n\n \n\nv.32.011\n\n \n\n \n\n \n\n \n\nv33.017, v34.014, v35.013, v36.011 and later\n\n \n\n \n\n \n\n \n\n1756-EN4\n\n \n\n \n\n \n\n \n\nv2.001\n\n \n\n \n\n \n\n \n\nv6.001 and later\n\n \n\n \n\n \n\n\n\n\n\nMitigations and Workarounds \nCustomers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. \n\n  *  Users who do not wish to use CIP security can disable the feature per device. See \"Disable CIP Security\" in Chapter 2 of \"CIP Security with Rockwell Automation Products\" (publication SECURE-AT001)\n\n\n\n\nFor information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested  security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight  to minimize the risk of the vulnerability. Customers can use  Stakeholder-Specific Vulnerability Categorization https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc  to generate more environment-specific prioritization."}],"source":{"advisory":"SD1963","discovery":"INTERNAL"},"title":"Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix® 5380 Vulnerable to DoS vulnerability via CIP","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"rockwellautomation","product":"compactlogix_5480_firmware","cpes":["cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*","cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*","cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil3_firmware:*:*:*:*:*:*:*:*","cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*","cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"32 .011","status":"affected","lessThan":"33.017","versionType":"custom"},{"version":"34.0","status":"affected","lessThan":"34.014","versionType":"custom"},{"version":"35.0","status":"affected","lessThan":"35.013","versionType":"custom"},{"version":"36.0","status":"affected","lessThan":"36.011","versionType":"custom"}]},{"vendor":"rockwellautomation","product":"compactlogix_5380_process_firmware","cpes":["cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*","cpe:2.3:o:rockwellautomation:compactlogix_5380_process_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"33.011","status":"affected","lessThan":"33.017","versionType":"custom"},{"version":"34.0","status":"affected","lessThan":"34.014","versionType":"custom"},{"version":"35.0","status":"affected","lessThan":"35.013","versionType":"custom"},{"version":"36.0","status":"affected","lessThan":"36.011","versionType":"custom"}]},{"vendor":"rockwellautomation","product":"compact_guardlogix_5380_sil2_firmware","cpes":["cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil2_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"32.013","status":"affected","lessThan":"33.017","versionType":"custom"},{"version":"34.0","status":"affected","lessThan":"34.014","versionType":"custom"},{"version":"35.0","status":"affected","lessThan":"35.013","versionType":"custom"},{"version":"36.0","status":"affected","lessThan":"36.011","versionType":"custom"}]},{"vendor":"rockwellautomation","product":"1756-en4_firmware","cpes":["cpe:2.3:o:rockwellautomation:1756-en4_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"2.001","status":"affected","lessThan":"6.001","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-12T20:22:58.224200Z","id":"CVE-2024-6077","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-12T21:01:50.254Z"}}]}}