No analysis available yet.
Vendor Workaround
Affected Product First Known in Firmware Revision Corrected in Firmware Revision ControlLogix® 5580 (1756-L8z) V28 V32.016, V33.015, V34.014, V35.011 and later GuardLogix® 5580 (1756-L8zS) V31 V32.016, V33.015, V34.014, V35.011 and later 1756-EN4TR V2 V5.001 and later 1756-EN2T, Series A/B/C 1756-EN2F, Series A/B 1756-EN2TR, Series A/B 1756-EN3TR, Series B v5.007(unsigned)/v5.027(signed) No fix is available for Series A/B/C. Users can upgrade to Series D to remediate this vulnerability 1756-EN2T, Series D 1756-EN2F, Series C 1756-EN2TR, Series C 1756-EN3TR, Series B 1756-EN2TP, Series A 1756-EN2T/D: V10.006 1756-EN2F/C: V10.009 1756-EN2TR/C: V10.007 1756-EN3TR/B: V10.007 1756-EN2TP/A: V10.020 V12.001 and later Users using the affected firmware and who are not able to upgrade to one of the corrected versions are encouraged to apply the following mitigation and security best practices, where possible. * Limit the allowed CIP commands on controllers by setting the mode switch to the RUN position. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47370 | A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis. |
Thu, 25 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2025-09-25T13:34:40.444Z
Reserved: 2024-06-21T12:21:00.689Z
Link: CVE-2024-6242
Updated: 2024-08-01T18:00:57.404Z
Status : Awaiting Analysis
Published: 2024-08-01T16:15:07.013
Modified: 2024-08-01T16:45:25.400
Link: CVE-2024-6242
No data.
OpenCVE Enrichment
No data.
EUVD