{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-6242", "ASSIGNER": "PSIRT@rockwellautomation.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted\u00ae Slot feature in a ControlLogix\u00ae controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-420: Unprotected Alternate Channel", "cweId": "CWE-420" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Rockwell Automation", "product": { "product_data": [ { "product_name": "ControlLogix\u00ae 5580 (1756-L8z)", "version": { "version_data": [ { "version_affected": "=", "version_value": "V28" } ] } }, { "product_name": "GuardLogix\u00ae 5580 (1756-L8zS)", "version": { "version_data": [ { "version_affected": "=", "version_value": "V31" } ] } }, { "product_name": "1756-EN4TR", "version": { "version_data": [ { "version_affected": "=", "version_value": "V2" } ] } }, { "product_name": "1756-EN2T", "version": { "version_data": [ { "version_affected": "=", "version_value": "v5.007(unsigned)/v5.027(signed)" }, { "version_affected": "=", "version_value": "1756-EN2T/D: V10.006" } ] } }, { "product_name": "1756-EN2F", "version": { "version_data": [ { "version_affected": "=", "version_value": "v5.007(unsigned)/v5.027(signed)" }, { "version_affected": "=", "version_value": "1756-EN2F/C: V10.009" } ] } }, { "product_name": "1756-EN2TR", "version": { "version_data": [ { "version_affected": "=", "version_value": "v5.007(unsigned)/v5.027(signed)" }, { "version_affected": "=", "version_value": "1756-EN2TR/C: V10.007" } ] } }, { "product_name": "1756-EN3TR", "version": { "version_data": [ { "version_affected": "=", "version_value": "v5.007(unsigned)/v5.027(signed)" }, { "version_affected": "=", "version_value": "1756-EN3TR/B: V10.007" } ] } }, { "product_name": "1756-EN2TP", "version": { "version_data": [ { "version_affected": "=", "version_value": "1756-EN2TP/A: V10.020" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1682.html", "refsource": "MISC", "name": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1682.html" } ] }, "generator": { "engine": "Vulnogram 0.2.0" }, "source": { "advisory": "SD1682", "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "

\n\n

Affected Product

First Known in Firmware Revision

Corrected in Firmware Revision

ControlLogix\u00ae 5580 (1756-L8z)

V28

V32.016, V33.015, V34.014,  
V35.011 and later

 

GuardLogix\u00ae 5580 (1756-L8zS)

V31

V32.016, V33.015, V34.014,  
V35.011 and later

1756-EN4TR

V2

V5.001 and later

1756-EN2T, Series A/B/C

1756-EN2F, Series A/B

1756-EN2TR, Series A/B

1756-EN3TR, Series B

v5.007(unsigned)/v5.027(signed)

No fix is available for Series A/B/C. Users can upgrade to Series D to remediate this vulnerability

1756-EN2T, Series D

1756-EN2F, Series C

1756-EN2TR, Series C

1756-EN3TR, Series B

1756-EN2TP, Series A

1756-EN2T/D: V10.006

1756-EN2F/C: V10.009

1756-EN2TR/C: V10.007

1756-EN3TR/B: V10.007

1756-EN2TP/A: V10.020

V12.001 and later

\n\n

\n\n

Users using the affected firmware and who are not able to upgrade to one of the corrected versions are encouraged to apply the following mitigation and security best practices, where possible.\u202f\u202f 

" } ], "value": "Affected Product \n\n\n\n\n\nFirst Known in Firmware Revision \n\n\n\n\n\nCorrected in Firmware Revision \n\n\n\n\n\nControlLogix\u00ae 5580 (1756-L8z) \n\n\n\n\n\nV28 \n\n\n\n\n\nV32.016, V33.015, V34.014, \u00a0\nV35.011 and later \n\n\n\n\u00a0\n\n\n\n\n\nGuardLogix\u00ae 5580 (1756-L8zS) \n\n\n\n\n\nV31 \n\n\n\n\n\nV32.016, V33.015, V34.014, \u00a0\nV35.011 and later \n\n\n\n\n\n1756-EN4TR \n\n\n\n\n\nV2 \n\n\n\n\n\nV5.001 and later \n\n\n\n\n\n1756-EN2T, Series A/B/C \n\n\n\n1756-EN2F, Series A/B \n\n\n\n1756-EN2TR, Series A/B \n\n\n\n1756-EN3TR, Series B \n\n\n\n\n\nv5.007(unsigned)/v5.027(signed) \n\n\n\n\n\nNo fix is available for Series A/B/C. Users can upgrade to Series D to remediate this vulnerability \n\n\n\n\n\n1756-EN2T, Series D \n\n\n\n1756-EN2F, Series C \n\n\n\n1756-EN2TR, Series C \n\n\n\n1756-EN3TR, Series B \n\n\n\n1756-EN2TP, Series A \n\n\n\n\n\n1756-EN2T/D: V10.006 \n\n\n\n1756-EN2F/C: V10.009 \n\n\n\n1756-EN2TR/C: V10.007 \n\n\n\n1756-EN3TR/B: V10.007 \n\n\n\n1756-EN2TP/A: V10.020 \n\n\n\n\n\nV12.001 and later \n\n\n\n\n\n\n\n\n\n\n\n\n\n\nUsers using the affected firmware and who are not able to upgrade to one of the corrected versions are encouraged to apply the following mitigation and security best practices, where possible.\u202f\u202f\u00a0\n\n\n\n * Limit the allowed CIP commands on controllers by setting the mode switch to the RUN position. \n\n\n\n\n\n\n\n\n * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight" } ], "credits": [ { "lang": "en", "value": "Claroty reported this vulnerability." } ] }