#VU95171 Unprotected Alternate Channel in Rockwell Automation products - CVE-2024-6242
Published: August 2, 2024 / Updated: August 2, 2024
Vulnerability identifier: #VU95171
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/E:U/U:Green
CVE-ID: CVE-2024-6242
CWE-ID: CWE-420
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
ControlLogix
GuardLogix
1756-EN2T Series A
1756-EN2T Series B
1756-EN2T Series C
1756-EN2F Series A
1756-EN2F Series B
1756-EN2TR Series A
1756-EN2TR Series B
1756-EN3TR Series B
1756-EN2T Series D
1756-EN2F Series C
1756-EN2TR Series C
1756-EN4TR
1756-EN2TP Series A
ControlLogix
GuardLogix
1756-EN2T Series A
1756-EN2T Series B
1756-EN2T Series C
1756-EN2F Series A
1756-EN2F Series B
1756-EN2TR Series A
1756-EN2TR Series B
1756-EN3TR Series B
1756-EN2T Series D
1756-EN2F Series C
1756-EN2TR Series C
1756-EN4TR
1756-EN2TP Series A
Software vendor:
Rockwell Automation
Rockwell Automation
Description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to unprotected alternate channel within the Trusted Slot feature. A remote user can execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.
Remediation
Install updates from vendor's website.
External links
- https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1682.html
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-09
- https://claroty.com/team82/research/bypassing-rockwell-automation-logix-controllers-local-chassis-security-protection
- https://claroty.com/team82/disclosure-dashboard/cve-2024-6242