An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic
loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload
the user project file to bring the device back online and continue normal operation.
References
Link | Resource |
---|---|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137664 | Permissions Required Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
07 Nov 2023, 03:51
Type | Values Removed | Values Added |
---|---|---|
Summary | An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online and continue normal operation. |
27 Dec 2022, 18:59
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137664 - Permissions Required, Vendor Advisory | |
CWE | NVD-CWE-noinfo | |
First Time |
Rockwellautomation guardlogix 5580
Rockwellautomation compactlogix 5580 Firmware Rockwellautomation compactlogix 5380 Firmware Rockwellautomation Rockwellautomation guardlogix 5580 Firmware Rockwellautomation compactlogix 5580 Rockwellautomation compactlogix 5480 Rockwellautomation compact Guardlogix 5380 Firmware Rockwellautomation compactlogix 5380 Rockwellautomation compact Guardlogix 5380 Rockwellautomation compactlogix 5480 Firmware |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:compactlogix_5580:-:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:rockwellautomation:compactlogix_5580_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:* cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:* |
20 Dec 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online and continue normal operation. |
19 Dec 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-19 23:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-3752
Mitre link : CVE-2022-3752
CVE.ORG link : CVE-2022-3752
JSON object : View
Products Affected
rockwellautomation
- compactlogix_5580_firmware
- compactlogix_5580
- guardlogix_5580_firmware
- compact_guardlogix_5380
- compactlogix_5380_firmware
- compactlogix_5480
- guardlogix_5580
- compactlogix_5380
- compactlogix_5480_firmware
- compact_guardlogix_5380_firmware
CWE