SB2024080232 - Unprotected Alternate Channel in Rockwell Automation Logix Controllers
Published: August 2, 2024 Updated: August 2, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Unprotected Alternate Channel (CVE-ID: CVE-2024-6242)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to unprotected alternate channel within the Trusted Slot feature. A remote user can execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.
Remediation
Install update from vendor's website.
References
- https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1682.html
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-09
- https://claroty.com/team82/research/bypassing-rockwell-automation-logix-controllers-local-chassis-security-protection
- https://claroty.com/team82/disclosure-dashboard/cve-2024-6242