cve/2021/CVE-2021-22681.md

25 lines
2.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-22681](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22681)
![](https://img.shields.io/static/v1?label=Product&message=Rockwell%20Automation%20Studio%205000%20Logix%20Designer%2C%20RSLogix%205000%2C%20Logix%20Controllers&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=Compact%20GuardLogix%205370%2C%205380%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=CompactLogix%201768%2C%201769%2C%205370%2C%205380%2C%205480%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=ControlLogix%205550%2C%205560%2C%205570%2C%205580%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=DriveLogix%205560%2C%205730%2C%201794-L34%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=GuardLogix%205570%2C%205580%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=RSLogix%205000%20Versions%2016%20through%2020%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=SoftLogix%205800%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Studio%205000%20Logix%20Designer%3A%20Versions%2021%20and%20later%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Insufficiently%20Protected%20Credentials%20CWE-522&color=brightgreen)
2024-05-25 21:48:12 +02:00
### Description
Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon