Critical Rockwell Automation Vulnerability: Unprotected Alternate Channel Puts ControlLogix at Risk!

Update your ControlLogix gear, folks! A fresh vulnerability could allow attackers to crash your party by executing CIP commands. With a CVSS score of 7.3, it’s time to take action. Rockwell Automation recommends upgrading unaffected modules and adopting security best practices to keep your systems…

Hot Take:

It’s 2024, and we’re still letting our industrial controllers go out in public with their channels unprotected. Rockwell Automation, you might want to consider some digital chastity belts! The CVSS folks seem to think it’s a 7.3 out of 10 on the “this-could-end-badly” scale, so maybe it’s time to upgrade those modules or start praying to the cybersecurity gods.

Key Points:

  • Rockwell Automation’s ControlLogix, GuardLogix, and 1756 ControlLogix I/O Modules are at risk due to an unprotected alternate channel.
  • Successful exploitation could allow attackers to execute CIP programming and configuration commands.
  • This vulnerability affects multiple versions of the modules, including both unsigned and signed versions.
  • Rockwell Automation recommends upgrading to Series D modules where no fix is available for earlier versions.
  • No known public exploits have been reported, but mitigation measures are highly recommended.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here