
CVE-2024-21916 – Rockwell Automation Denial-of-service Vulnerability in ICE1 Controller
https://notcve.org/view.php?id=CVE-2024-21916
31 Jan 2024 — A denial-of-service vulnerability exists in specific Rockwell Automation ControlLogix ang GuardLogix controllers. If exploited, the product could potentially experience a major nonrecoverable fault (MNRF). The device will restart itself to recover from the MNRF. Existe una vulnerabilidad de denegación de servicio en controladores Rockwell Automation ControlLogix ang GuardLogix. Si se explota, el producto podría experimentar un fallo importante no recuperable (MNRF). • https://www.rockwellautomation.com/en-us/support/advisory.SD1661.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2022-3157 – Rockwell Automation GuardLogix and ControlLogix controllers Vulnerable to Denial-Of-Service Attack
https://notcve.org/view.php?id=CVE-2022-3157
16 Dec 2022 — A vulnerability exists in the Rockwell Automation controllers that allows a malformed CIP request to cause a major non-recoverable fault (MNRF) and a denial-of-service condition (DOS). Existe una vulnerabilidad en los controladores de Rockwell Automation que permite que una solicitud CIP con formato incorrecto cause una falla mayor no recuperable (MNRF) y una condición de Denegación de Servicio (DoS) (DOS). • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137757 • CWE-20: Improper Input Validation •

CVE-2020-6998 – Rockwell Automation CompactLogix 5370 and ControlLogix 5570 Controllers Improper Input Validation
https://notcve.org/view.php?id=CVE-2020-6998
27 Jul 2022 — The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop. This may allow an attacker to send specially crafted CIP packet requests to a controller, which may cause denial-of-service conditions in communications with other products. El algoritmo de establecimiento de conexión encontrado en Rockwell Automation CompactLogix 5370 and ControlLogix 5570... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1130398 • CWE-20: Improper Input Validation •

CVE-2022-1797 – Rockwell Automation Logix Controllers Uncontrolled Resource Consumption
https://notcve.org/view.php?id=CVE-2022-1797
31 May 2022 — A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online. Un mensaje de protocolo industrial común de clase 3 malformado con una conexión en caché puede causar una condición de denegación de servicio en los controlad... • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1135559 • CWE-400: Uncontrolled Resource Consumption •

CVE-2022-1161 – ICSA-22-090-05 Rockwell Automation Logix Controllers
https://notcve.org/view.php?id=CVE-2022-1161
11 Apr 2022 — An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change one and not the other. Un atacante con la capacidad de modificar un programa de usuario puede cambiar el código del programa de usuario en algunos sistemas ControlLogix, CompactLogix y GuardLogix Control. Studio 5... • https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-05 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •

CVE-2021-22681
https://notcve.org/view.php?id=CVE-2021-22681
03 Mar 2021 — Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an un... • https://us-cert.cisa.gov/ics/advisories/icsa-21-056-03 • CWE-522: Insufficiently Protected Credentials •

CVE-2016-9343
https://notcve.org/view.php?id=CVE-2016-9343
13 Feb 2017 — An issue was discovered in Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 through 21.00 (excluding all firmware versions prior to FRN 16.00, which are not affected). By sending malformed common industrial protocol (CIP) packet, an attacker may be able to overflow a stack-based buffer and execute code on the controller or initiate a nonrecoverable fault resulting in a denial of service. Ha sido descubierto un problema en Rockwell Automation Logix5000 Programmable Automation Contro... • http://www.securityfocus.com/bid/95304 • CWE-787: Out-of-bounds Write •