Vulnerability identifier: #VU51180
Vulnerability risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-835
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Allen-Bradley Armor Compact GuardLogix 5370
Hardware solutions /
Firmware
Armor GuardLogix Safety Controllers
Hardware solutions /
Firmware
Allen-Bradley CompactLogix 5370 L1
Hardware solutions /
Firmware
Allen-Bradley CompactLogix 5370 L2
Hardware solutions /
Firmware
Allen-Bradley CompactLogix 5370 L3
Hardware solutions /
Firmware
Allen-Bradley Compact GuardLogix 5370
Hardware solutions /
Firmware
ControlLogix 5570 controllers
Hardware solutions /
Firmware
Vendor: Rockwell Automation
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the connection establishment algorithm does not sufficiently manage its control flow during execution. A remote attacker can send a specially crafted CIP packet and cause denial of service conditions.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Allen-Bradley Armor Compact GuardLogix 5370: 33
Armor GuardLogix Safety Controllers: 33
Allen-Bradley CompactLogix 5370 L1: 33
Allen-Bradley CompactLogix 5370 L2: 33
Allen-Bradley CompactLogix 5370 L3: 33
Allen-Bradley Compact GuardLogix 5370: 33
ControlLogix 5570 controllers: 33
External links
http://ics-cert.us-cert.gov/advisories/icsa-21-061-02
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.