Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-24501 Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user.
Fixes

Solution

No solution given by the vendor.


Workaround

Rockwell Automation recommends users of the affected hardware and software take risk mitigation steps listed below. Users are encouraged, when possible, to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy. There is no direct mitigation for this vulnerability in the Logix Designer application. However, a detection method is available to determine if the user program residing in the controller is identical to what was downloaded. This user program verification can be done by the following: On-demand using the Logix Designer application Compare Tool v9 or later Scheduled using FactoryTalk AssetCentre v12 or later user program verification (Available Fall 2022) To leverage these detection capabilities, users are directed to upgrade to: Studio 5000 v34 software. or later Corresponding versions of Logix 5580, 5380, 5480, GuardLogix 5580 and Compact GuardLogix 5380 controller firmware. One of the following compare tools Logix Designer application Compare Tool v9 or later – installed with Studio 5000 Logix Designer FactoryTalk AssetCentre v12 or later software (Available Fall 2022) This user program comparison must be performed on an uncompromised workstation.

History

Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T17:57:50.739Z

Reserved: 2022-03-29T00:00:00.000Z

Link: CVE-2022-1159

cve-icon Vulnrichment

Updated: 2024-08-02T23:55:24.360Z

cve-icon NVD

Status : Modified

Published: 2022-04-01T23:15:12.813

Modified: 2024-11-21T06:40:09.400

Link: CVE-2022-1159

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.