
CVE-2020-6998 – Rockwell Automation CompactLogix 5370 and ControlLogix 5570 Controllers Improper Input Validation
https://notcve.org/view.php?id=CVE-2020-6998
27 Jul 2022 — The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop. This may allow an attacker to send specially crafted CIP packet requests to a controller, which may cause denial-of-service conditions in communications with other products. El algoritmo de establecimiento de conexión encontrado en Rockwell Automation CompactLogix 5370 and ControlLogix 5570... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1130398 • CWE-20: Improper Input Validation •

CVE-2022-2179 – ICSA-22-188-01 Rockwell Automation MicroLogix Improper Restriction of Rendered UI Layers or Frames
https://notcve.org/view.php?id=CVE-2022-2179
20 Jul 2022 — The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks. El encabezado X-Frame-Options en Rockwell Automation MicroLogix 1100/1400 Versiones 21.007 y anteriores, no está configurado en la respuesta HTTP, lo que podría permitir ataques de clickjacking • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1135994 • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVE-2022-1797 – Rockwell Automation Logix Controllers Uncontrolled Resource Consumption
https://notcve.org/view.php?id=CVE-2022-1797
31 May 2022 — A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online. Un mensaje de protocolo industrial común de clase 3 malformado con una conexión en caché puede causar una condición de denegación de servicio en los controlad... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1135559 • CWE-400: Uncontrolled Resource Consumption •

CVE-2022-1161 – ICSA-22-090-05 Rockwell Automation Logix Controllers
https://notcve.org/view.php?id=CVE-2022-1161
11 Apr 2022 — An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change one and not the other. Un atacante con la capacidad de modificar un programa de usuario puede cambiar el código del programa de usuario en algunos sistemas ControlLogix, CompactLogix y GuardLogix Control. Studio 5... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-05 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •

CVE-2022-1118 – Rockwell Automation ISaGRAF Deserialization of Untrusted Data
https://notcve.org/view.php?id=CVE-2022-1118
08 Apr 2022 — Connected Components Workbench (v13.00.00 and prior), ISaGRAF Workbench (v6.0 though v6.6.9), and Safety Instrumented System Workstation (v1.2 and prior (for Trusted Controllers)) do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in arbitrary code execution. This vulnerability requires user interaction to be successfully exploited Connected Components Workbench (version... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01 • CWE-502: Deserialization of Untrusted Data •

CVE-2022-1159 – Rockwell Automation Studio 5000 Logix Designer Code Injection
https://notcve.org/view.php?id=CVE-2022-1159
01 Apr 2022 — Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user. Rockwell Automation Studio 5000 Logix Designer (todas las versiones) son vulnerables cuando un atacante que logra acceso de administrador en una estación de trabajo que ejecuta Studio 5000 Logix Designer podría inyectar código de controlador no detectable para un usuario • https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-07 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2022-1018 – ICSA-22-088-01 Rockwell Automation ISaGRAF
https://notcve.org/view.php?id=CVE-2022-1018
01 Apr 2022 — When opening a malicious solution file provided by an attacker, the application suffers from an XML external entity vulnerability due to an unsafe call within a dynamic link library file. An attacker could exploit this to pass data from local files to a remote web server, leading to a loss of confidentiality. Cuando es abierto un archivo de solución malicioso proporcionado por un atacante, la aplicación sufre una vulnerabilidad de tipo XML external entity debido a una llamada no segura dentro de un archivo ... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-01 • CWE-611: Improper Restriction of XML External Entity Reference •

CVE-2021-32960 – Rockwell Automation FactoryTalk Services Platform Protection Mechanism Failure
https://notcve.org/view.php?id=CVE-2021-32960
01 Apr 2022 — Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine. Rockwell Automation FactoryTalk Services Platform versiones v6.11 y anteriores, si FactoryTalk Security está habilitado e i... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785 • CWE-693: Protection Mechanism Failure CWE-863: Incorrect Authorization •

CVE-2021-27475 – Rockwell Automation Connected Components Workbench Deserialization of Untrusted Data
https://notcve.org/view.php?id=CVE-2021-27475
23 Mar 2022 — Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited. Rockwell Automation Connected Components Workbench versiones v12.00.00 y anteriores, no limita los objetos que pueden ser deserializad... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131435 • CWE-502: Deserialization of Untrusted Data •

CVE-2021-27471 – Rockwell Automation Connected Components Workbench Path Traversal
https://notcve.org/view.php?id=CVE-2021-27471
23 Mar 2022 — The parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by Rockwell Automation Connected Components Workbench v12.00.00 and prior, can traverse the file system. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the Connected Components Workbench software. User interaction is required for this exploit to be succe... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131435 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •