CVE-2022-1159

Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-07 Mitigation Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*

History

08 Apr 2022, 20:12

Type Values Removed Values Added
References (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-07 - (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-07 - Mitigation, Third Party Advisory, US Government Resource
First Time Rockwellautomation compactlogix 5480 Firmware
Rockwellautomation controllogix 5580 Firmware
Rockwellautomation compactlogix 5380
Rockwellautomation
Rockwellautomation guardlogix 5580
Rockwellautomation compact Guardlogix 5380
Rockwellautomation guardlogix 5580 Firmware
Rockwellautomation compact Guardlogix 5380 Firmware
Rockwellautomation compactlogix 5480
Rockwellautomation compactlogix 5380 Firmware
Rockwellautomation controllogix 5580
CPE cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 7.2

01 Apr 2022, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-01 23:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-1159

Mitre link : CVE-2022-1159

CVE.ORG link : CVE-2022-1159


JSON object : View

Products Affected

rockwellautomation

  • controllogix_5580
  • controllogix_5580_firmware
  • guardlogix_5580_firmware
  • compactlogix_5480_firmware
  • compact_guardlogix_5380
  • compactlogix_5480
  • guardlogix_5580
  • compactlogix_5380
  • compactlogix_5380_firmware
  • compact_guardlogix_5380_firmware
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')