This content is restricted.
Brief
Here is a summary of the View CSAF document:
Summary:
Critical vulnerability discovered in Rockwell Automation's ControlLogix and GuardLogix programmable logic controllers, affecting firmware versions 20.011 and earlier. The vulnerability, rated CVSS v3 8.6, is an Improper Restriction of Operations within the Bounds of a Memory Buffer, allowing an attacker to crash the device with a Denial-of-Service (DoS) attack. The affected products are ControlLogix 5570, ControlLogix 5570 redundant, and GuardLogix 5570. To mitigate this vulnerability, Rockwell Automation recommends updating firmware to corrected versions (v33.016, 34.013, 35.012, 36.011 and later) and implementing security best practices, such as minimizing network exposure and using Virtual Private Networks (VPNs). The US Cybersecurity and Infrastructure Security Agency (CISA) encourages organizations to perform a risk assessment and implement defensive measures to minimize the risk of exploitation.
Highlights content goes here...
This content is restricted.
