2024-05-25 21:48:12 +02:00
|
|
|
### [CVE-2021-22681](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22681)
|
|
|
|
|

|
2025-09-29 21:09:30 +02:00
|
|
|

|
|
|
|
|

|
|
|
|
|

|
|
|
|
|

|
|
|
|
|

|
|
|
|
|

|
|
|
|
|

|
|
|
|
|

|
|
|
|
|

|
2024-05-25 21:48:12 +02:00
|
|
|
|
|
|
|
|
### Description
|
|
|
|
|
|
|
|
|
|
Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.
|
|
|
|
|
|
|
|
|
|
### POC
|
|
|
|
|
|
|
|
|
|
#### Reference
|
|
|
|
|
No PoCs from references.
|
|
|
|
|
|
|
|
|
|
#### Github
|
|
|
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
|
|
|
|