Rockwell Automation ControlLogix® Controller Vulnerability
CVE-2024-6242
Key Information:
- Vendor
- Rockwell Automation
- Vendor
- CVE Published:
- 1 August 2024
Badges
Summary
CVE-2024-6242 is a security bypass vulnerability that affects Rockwell Automation Logix controllers. It allows threat actors to exploit the Trusted Slot feature in a ControlLogix controller to execute CIP commands and modify user projects and device configurations. The flaw affects various models within the Logix family of programmable logic controllers and poses a significant risk to industrial automation systems. The vulnerability has been exploited, but there is no information about ransomware groups using it. Mitigation strategies recommended by Rockwell Automation include updating affected products to the latest firmware versions and limiting CIP commands by setting the mode switch to the RUN position. It is crucial for organizations to maintain up-to-date firmware and implement robust security practices to protect against evolving threats in industrial control systems.
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
Rockwell PLC Security Bypass Threatens Manufacturing Processes
A security vulnerability in Rockwell Automation's ControlLogix 1756 programmable logic controllers, tracked as CVE-2024-6242, could allow tampering with physical processes at plants.
Rockwell Controller Flaw Exposes Industrial Control Systems
A vulnerability in Rockwell Automation's ControlLogix 1756 devices allows attackers to bypass a critical security feature, turning the trusted slot mechanism into a

Rockwell Automation Devices Flaw Let Hackers Gain Unauthorized Access
A critical security vulnerability in Rockwell Automation's ControlLogix and GuardLogix controllers has been discovered. This vulnerability could potentially allow attackers to bypass security measures and gain unauthorized access to industrial control systems.
References
Timeline
- 👾
Exploit known to exist
- 📰
First article discovered by SecurityWeek
Vulnerability published