Rockwell Automation ControlLogix® Controller Vulnerability
CVE-2024-6242

Currently unrated

Key Information:

Vendor
CVE Published:
1 August 2024

Badges

👾 Exploit Exists📰 News Worthy

Summary

CVE-2024-6242 is a security bypass vulnerability that affects Rockwell Automation Logix controllers. It allows threat actors to exploit the Trusted Slot feature in a ControlLogix controller to execute CIP commands and modify user projects and device configurations. The flaw affects various models within the Logix family of programmable logic controllers and poses a significant risk to industrial automation systems. The vulnerability has been exploited, but there is no information about ransomware groups using it. Mitigation strategies recommended by Rockwell Automation include updating affected products to the latest firmware versions and limiting CIP commands by setting the mode switch to the RUN position. It is crucial for organizations to maintain up-to-date firmware and implement robust security practices to protect against evolving threats in industrial control systems.

News Articles

Rockwell PLC Security Bypass Threatens Manufacturing Processes

A security vulnerability in Rockwell Automation's ControlLogix 1756 programmable logic controllers, tracked as CVE-2024-6242, could allow tampering with physical processes at plants.

Rockwell Controller Flaw Exposes Industrial Control Systems

A vulnerability in Rockwell Automation's ControlLogix 1756 devices allows attackers to bypass a critical security feature, turning the trusted slot mechanism into a

Rockwell Automation Devices Flaw Let Hackers Gain Unauthorized Access

A critical security vulnerability in Rockwell Automation's ControlLogix and GuardLogix controllers has been discovered. This vulnerability could potentially allow attackers to bypass security measures and gain unauthorized access to industrial control systems.

References

Timeline

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by SecurityWeek

  • Vulnerability published

.