#VU95171 Unprotected Alternate Channel in Rockwell Automation products - CVE-2024-6242

 

#VU95171 Unprotected Alternate Channel in Rockwell Automation products - CVE-2024-6242

Published: August 2, 2024 / Updated: August 2, 2024


Vulnerability identifier: #VU95171
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/E:U/U:Green
CVE-ID: CVE-2024-6242
CWE-ID: CWE-420
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
ControlLogix
GuardLogix
1756-EN2T Series A
1756-EN2T Series B
1756-EN2T Series C
1756-EN2F Series A
1756-EN2F Series B
1756-EN2TR Series A
1756-EN2TR Series B
1756-EN3TR Series B
1756-EN2T Series D
1756-EN2F Series C
1756-EN2TR Series C
1756-EN4TR
1756-EN2TP Series A
Software vendor:
Rockwell Automation

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to unprotected alternate channel within the Trusted Slot feature. A remote user can execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.


Remediation

Install updates from vendor's website.

External links