CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.
Metrics
Affected Vendors & Products
References
History
Mon, 21 Oct 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation compact Guardlogix 5380 Sil 2
Rockwellautomation compact Guardlogix 5380 Sil 2 Firmware Rockwellautomation compact Guardlogix 5380 Sil 3 Rockwellautomation compact Guardlogix 5380 Sil 3 Firmware Rockwellautomation compactlogix 5380 Rockwellautomation compactlogix 5480 Rockwellautomation controllogix 5580 Rockwellautomation controllogix 5580 Process Rockwellautomation factorytalk Logix Echo Firmware Rockwellautomation guardlogix 5580 |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_2:-:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:compact_guardlogix_5380_sil_3:-:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:controllogix_5580_process:-:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:factorytalk_logix_echo:-:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_2_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil_3_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:factorytalk_logix_echo_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Rockwellautomation compact Guardlogix 5380 Sil 2
Rockwellautomation compact Guardlogix 5380 Sil 2 Firmware Rockwellautomation compact Guardlogix 5380 Sil 3 Rockwellautomation compact Guardlogix 5380 Sil 3 Firmware Rockwellautomation compactlogix 5380 Rockwellautomation compactlogix 5480 Rockwellautomation controllogix 5580 Rockwellautomation controllogix 5580 Process Rockwellautomation factorytalk Logix Echo Firmware Rockwellautomation guardlogix 5580 |
Tue, 15 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation
Rockwellautomation compact Guardlogix 5380 Sil2 Firmware Rockwellautomation compact Guardlogix 5380 Sil3 Firmware Rockwellautomation compactlogix 5380 Firmware Rockwellautomation compactlogix 5480 Firmware Rockwellautomation controllogix 5580 Firmware Rockwellautomation controllogix 5580 Process Firmware Rockwellautomation factorytalk Logix Echo Rockwellautomation guardlogix 5580 Firmware |
|
CPEs | cpe:2.3:a:rockwellautomation:factorytalk_logix_echo:*:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil2_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil3_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Rockwellautomation
Rockwellautomation compact Guardlogix 5380 Sil2 Firmware Rockwellautomation compact Guardlogix 5380 Sil3 Firmware Rockwellautomation compactlogix 5380 Firmware Rockwellautomation compactlogix 5480 Firmware Rockwellautomation controllogix 5580 Firmware Rockwellautomation controllogix 5580 Process Firmware Rockwellautomation factorytalk Logix Echo Rockwellautomation guardlogix 5580 Firmware |
|
Metrics |
ssvc
|
Mon, 14 Oct 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running. | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Rockwell
Published: 2024-10-14T20:53:49.191Z
Updated: 2024-10-15T14:43:19.768Z
Reserved: 2024-06-20T16:08:17.052Z
Link: CVE-2024-6207
Vulnrichment
Updated: 2024-10-15T14:21:39.960Z
NVD
Status : Analyzed
Published: 2024-10-14T21:15:12.460
Modified: 2024-10-21T13:20:45.617
Link: CVE-2024-6207
Redhat
No data.