CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.
History

Mon, 21 Oct 2024 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation compact Guardlogix 5380 Sil 2
Rockwellautomation compact Guardlogix 5380 Sil 2 Firmware
Rockwellautomation compact Guardlogix 5380 Sil 3
Rockwellautomation compact Guardlogix 5380 Sil 3 Firmware
Rockwellautomation compactlogix 5380
Rockwellautomation compactlogix 5480
Rockwellautomation controllogix 5580
Rockwellautomation controllogix 5580 Process
Rockwellautomation factorytalk Logix Echo Firmware
Rockwellautomation guardlogix 5580
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_2:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_3:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:controllogix_5580_process:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:factorytalk_logix_echo:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:factorytalk_logix_echo_firmware:*:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation compact Guardlogix 5380 Sil 2
Rockwellautomation compact Guardlogix 5380 Sil 2 Firmware
Rockwellautomation compact Guardlogix 5380 Sil 3
Rockwellautomation compact Guardlogix 5380 Sil 3 Firmware
Rockwellautomation compactlogix 5380
Rockwellautomation compactlogix 5480
Rockwellautomation controllogix 5580
Rockwellautomation controllogix 5580 Process
Rockwellautomation factorytalk Logix Echo Firmware
Rockwellautomation guardlogix 5580

Tue, 15 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation
Rockwellautomation compact Guardlogix 5380 Sil2 Firmware
Rockwellautomation compact Guardlogix 5380 Sil3 Firmware
Rockwellautomation compactlogix 5380 Firmware
Rockwellautomation compactlogix 5480 Firmware
Rockwellautomation controllogix 5580 Firmware
Rockwellautomation controllogix 5580 Process Firmware
Rockwellautomation factorytalk Logix Echo
Rockwellautomation guardlogix 5580 Firmware
CPEs cpe:2.3:a:rockwellautomation:factorytalk_logix_echo:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation
Rockwellautomation compact Guardlogix 5380 Sil2 Firmware
Rockwellautomation compact Guardlogix 5380 Sil3 Firmware
Rockwellautomation compactlogix 5380 Firmware
Rockwellautomation compactlogix 5480 Firmware
Rockwellautomation controllogix 5580 Firmware
Rockwellautomation controllogix 5580 Process Firmware
Rockwellautomation factorytalk Logix Echo
Rockwellautomation guardlogix 5580 Firmware
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 14 Oct 2024 21:00:00 +0000

Type Values Removed Values Added
Description CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published: 2024-10-14T20:53:49.191Z

Updated: 2024-10-15T14:43:19.768Z

Reserved: 2024-06-20T16:08:17.052Z

Link: CVE-2024-6207

cve-icon Vulnrichment

Updated: 2024-10-15T14:21:39.960Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-14T21:15:12.460

Modified: 2024-10-21T13:20:45.617

Link: CVE-2024-6207

cve-icon Redhat

No data.