When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the CPU to stop logic execution and enter a fault state, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.
Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Controllogix_controllers | Rockwellautomation | * | 20 (including) |
Guardlogix_controllers | Rockwellautomation | * | 20 (including) |
Micrologix | Rockwellautomation | * | 1100 (including) |
Micrologix | Rockwellautomation | * | 1400 (including) |
Softlogix_controllers | Rockwellautomation | * | 19 (including) |
1756-enbt | Rockwellautomation | - (including) | - (including) |
1756-eweb | Rockwellautomation | - (including) | - (including) |
1768-enbt | Rockwellautomation | - (including) | - (including) |
1768-eweb | Rockwellautomation | - (including) | - (including) |
1794-aentr_flex_i/o_ethernet/ip_adapter | Rockwellautomation | - (including) | - (including) |
Compactlogix | Rockwellautomation | * | 18 (including) |
Compactlogix_controllers | Rockwellautomation | * | 19 (including) |
Compactlogix_l32e_controller | Rockwellautomation | - (including) | - (including) |
Compactlogix_l35e_controller | Rockwellautomation | - (including) | - (including) |
Controllogix | Rockwellautomation | * | 18 (including) |
Flexlogix_1788-enbt_adapter | Rockwellautomation | - (including) | - (including) |
Guardlogix | Rockwellautomation | * | 18 (including) |
Softlogix | Rockwellautomation | * | 18 (including) |
Access control involves the use of several protection mechanisms such as:
When any mechanism is not applied or otherwise fails, attackers can compromise the security of the product by gaining privileges, reading sensitive information, executing commands, evading detection, etc. There are two distinct behaviors that can introduce access control weaknesses: