Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-24501 | Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user. |
Solution
No solution given by the vendor.
Workaround
Rockwell Automation recommends users of the affected hardware and software take risk mitigation steps listed below. Users are encouraged, when possible, to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy. There is no direct mitigation for this vulnerability in the Logix Designer application. However, a detection method is available to determine if the user program residing in the controller is identical to what was downloaded. This user program verification can be done by the following: On-demand using the Logix Designer application Compare Tool v9 or later Scheduled using FactoryTalk AssetCentre v12 or later user program verification (Available Fall 2022) To leverage these detection capabilities, users are directed to upgrade to: Studio 5000 v34 software. or later Corresponding versions of Logix 5580, 5380, 5480, GuardLogix 5580 and Compact GuardLogix 5380 controller firmware. One of the following compare tools Logix Designer application Compare Tool v9 or later – installed with Studio 5000 Logix Designer FactoryTalk AssetCentre v12 or later software (Available Fall 2022) This user program comparison must be performed on an uncompromised workstation.
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-07 |
![]() ![]() |
Wed, 16 Apr 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:57:50.739Z
Reserved: 2022-03-29T00:00:00.000Z
Link: CVE-2022-1159

Updated: 2024-08-02T23:55:24.360Z

Status : Modified
Published: 2022-04-01T23:15:12.813
Modified: 2024-11-21T06:40:09.400
Link: CVE-2022-1159

No data.

No data.