Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-03-03 10:15
Updated : 2022-04-25 09:16
NVD link : CVE-2021-22681
Mitre link : CVE-2021-22681
JSON object : View
CWE
CWE-522
Insufficiently Protected Credentials
Products Affected
rockwellautomation
- compactlogix_1769
- factorytalk_services_platform
- studio_5000_logix_designer
- compactlogix_5370
- compactlogix_5480
- guardlogix_5580
- compact_guardlogix_5380
- drivelogix_5560
- softlogix_5800
- guardlogix_5570
- compact_guardlogix_5370
- compactlogix_1768
- controllogix_5580
- controllogix_5570
- controllogix_5560
- drivelogix_1794-l34
- drivelogix_5730
- compactlogix_5380
- rslogix_5000
- controllogix_5550