Description

CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.

INFO

Published Date :

2024-10-14T20:53:49.191Z

Last Modified :

2024-10-15T14:43:19.768Z

Source :

Rockwell
AFFECTED PRODUCTS

The following products are affected by CVE-2024-6207 vulnerability.

Vendors Products
Rockwellautomation
  • Compact Guardlogix 5380 Sil2 Firmware
  • Compact Guardlogix 5380 Sil3 Firmware
  • Compact Guardlogix 5380 Sil 2
  • Compact Guardlogix 5380 Sil 2 Firmware
  • Compact Guardlogix 5380 Sil 3
  • Compact Guardlogix 5380 Sil 3 Firmware
  • Compactlogix 5380
  • Compactlogix 5380 Firmware
  • Compactlogix 5480
  • Compactlogix 5480 Firmware
  • Controllogix 5580
  • Controllogix 5580 Firmware
  • Controllogix 5580 Process
  • Controllogix 5580 Process Firmware
  • Factorytalk Logix Echo
  • Factorytalk Logix Echo Firmware
  • Guardlogix 5580
  • Guardlogix 5580 Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-6207.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact