Rockwell Automation ControlLogix Communication Modules Vulnerable to Remote Code Execution
CVE-2023-3595

9.8CRITICAL

Key Information:

Badges

๐Ÿ’ฐ Ransomware๐Ÿ‘พ Exploit Exists๐Ÿ“ฐ News Worthy

Summary

A vulnerability exists in Rockwell Automation's ControlLogix communication products, specifically the 1756 EN2* and 1756 EN3* models. This flaw could be exploited by a malicious user to achieve remote code execution with persistence. Attackers can craft malicious CIP messages to manipulate, deny, or exfiltrate data traversing the affected device, thus compromising the integrity and confidentiality of the system.

Affected Version(s)

1756-EN2F Series A, B <=5.008 & 5.028

1756-EN2F Series C <=11.003

1756-EN2FK Series A, B <=5.008 & 5.028

News Articles

Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote Attacks

U.S. CISA warns of critical vulnerabilities in Rockwell Automation ControlLogix ENIP modules, allowing remote code execution and DoS attacks.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ“ฐ

    First article discovered by The Hacker News

  • ๐Ÿ’ฐ

    Used in Ransomware

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.