Description
An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change one and not the other.
Published: 2022-04-11
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The following mitigations should be applied for ControlLogix 5560, ControlLogix 5570, ControlLogix 5580 series, GuardLogix 5570, GuardLogix 5580, GuardLogix 5380, CompactLogix, CompactLogix 5380 devices: Risk Mitigation A: Recompile and download user program code (i.e., acd). Put controller mode switch into Run position. If keeping controller mode switch in Run is impractical, use the following mitigation: Recompile and download user program code (i.e., acd). Monitor controller change log for any unexpected modifications or anomalous activity. Utilize the Controller Log feature. Utilize Change Detection in the Logix Designer Application. If available, use the functionality in FactoryTalk AssetCenter software to detect changes. Risk Mitigation B: Implement CIP Security to help prevent unauthorized connections when properly deployed. Supported controllers and communications modules include: ControlLogix 5580 processors using on-board EtherNet/IP port. GuardLogix 5580 processors using on-board EtherNet/IP port. ControlLogix 5580 processors operating in High Availability (HA) configurations using 1756-EN4TR ControlLogix 5560, ControlLogix 5570, ControlLogix 5580, GuardLogix 5570 and GuardLogix 5580 can use a 1756-EN4TR ControlLogix EtherNet/IP module. If using a 1756-EN2T, then replace with a 1756-EN4TR CompactLogix 5380 using on-board EtherNet/IP port. CompactLogix GuardLogix 5380 using on-board EtherNet/IP port. The following mitigations should be applied for 1768 CompactLogix, 1769 CompactLogix, CompactLogix 5370, and CompactLogix 5480 devices: Recompile and download user program code (i.e., acd). Put controller mode switch into Run position. If keeping controller mode switch in Run is impractical, then use the following mitigation: Recompile and download user program code (i.e., acd). Monitor controller change log for any unexpected modifications or anomalous activity. Use the Controller Log feature. Use Change Detection in the Logix Designer application. If available, use the functionality in FactoryTalk AssetCenter to detect changes.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-24503 An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change one and not the other.
History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Rockwellautomation Compact Guardlogix 5370 Compact Guardlogix 5370 Firmware Compact Guardlogix 5380 Compact Guardlogix 5380 Firmware Compactlogix 1768-l43 Compactlogix 1768-l43 Firmware Compactlogix 1768-l45 Compactlogix 1768-l45 Firmware Compactlogix 1769-l31 Compactlogix 1769-l31 Firmware Compactlogix 1769-l32c Compactlogix 1769-l32c Firmware Compactlogix 1769-l32e Compactlogix 1769-l32e Firmware Compactlogix 1769-l35cr Compactlogix 1769-l35cr Firmware Compactlogix 1769-l35e Compactlogix 1769-l35e Firmware Compactlogix 5370 L1 Compactlogix 5370 L1 Firmware Compactlogix 5370 L2 Compactlogix 5370 L2 Firmware Compactlogix 5370 L3 Compactlogix 5370 L3 Firmware Compactlogix 5380 Compactlogix 5380 Firmware Compactlogix 5480 Compactlogix 5480 Firmware Controllogix 5550 Controllogix 5550 Firmware Controllogix 5560 Controllogix 5560 Firmware Controllogix 5570 Controllogix 5570 Firmware Controllogix 5580 Controllogix 5580 Firmware Drivelogix 5730 Drivelogix 5730 Firmware Flexlogix 1794-l34 Flexlogix 1794-l34 Firmware Guardlogix 5560 Guardlogix 5560 Firmware Guardlogix 5570 Guardlogix 5570 Firmware Guardlogix 5580 Guardlogix 5580 Firmware Softlogix 5800 Softlogix 5800 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:31:12.359Z

Reserved: 2022-03-29T00:00:00.000Z

Link: CVE-2022-1161

cve-icon Vulnrichment

Updated: 2024-08-02T23:55:24.400Z

cve-icon NVD

Status : Modified

Published: 2022-04-11T20:15:18.017

Modified: 2024-11-21T06:40:09.667

Link: CVE-2022-1161

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses