CVE-2021-22681
- EPSS 16.25%
- Veröffentlicht 03.03.2021 18:15:14
- Zuletzt bearbeitet 06.03.2026 13:44:06
- Quelle ics-cert@hq.dhs.gov
- CVE-Watchlists
- Unerledigt
Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.
Rockwellautomation ≫ Compact Guardlogix 5380 Version-
Rockwellautomation ≫ Compactlogix 1768 Version-
Rockwellautomation ≫ Compactlogix 1769 Version-
Rockwellautomation ≫ Compactlogix 5370 Version-
Rockwellautomation ≫ Compactlogix 5380 Version-
Rockwellautomation ≫ Compactlogix 5480 Version-
Rockwellautomation ≫ Controllogix 5550 Version-
Rockwellautomation ≫ Controllogix 5560 Version-
Rockwellautomation ≫ Controllogix 5570 Version-
Rockwellautomation ≫ Controllogix 5580 Version-
Rockwellautomation ≫ Drivelogix 1794-l34 Version-
Rockwellautomation ≫ Drivelogix 5560 Version-
Rockwellautomation ≫ Drivelogix 5730 Version-
Rockwellautomation ≫ Guardlogix 5570 Version-
Rockwellautomation ≫ Guardlogix 5580 Version-
Rockwellautomation ≫ Softlogix 5800 Version-
Rockwellautomation ≫ Compact Guardlogix 5380 Version-
Rockwellautomation ≫ Compactlogix 1768 Version-
Rockwellautomation ≫ Compactlogix 1769 Version-
Rockwellautomation ≫ Compactlogix 5370 Version-
Rockwellautomation ≫ Compactlogix 5380 Version-
Rockwellautomation ≫ Compactlogix 5480 Version-
Rockwellautomation ≫ Controllogix 5550 Version-
Rockwellautomation ≫ Controllogix 5560 Version-
Rockwellautomation ≫ Controllogix 5570 Version-
Rockwellautomation ≫ Controllogix 5580 Version-
Rockwellautomation ≫ Drivelogix 1794-l34 Version-
Rockwellautomation ≫ Drivelogix 5560 Version-
Rockwellautomation ≫ Drivelogix 5730 Version-
Rockwellautomation ≫ Guardlogix 5570 Version-
Rockwellautomation ≫ Guardlogix 5580 Version-
Rockwellautomation ≫ Softlogix 5800 Version-
Rockwellautomation ≫ Compact Guardlogix 5380 Version-
Rockwellautomation ≫ Compactlogix 1768 Version-
Rockwellautomation ≫ Compactlogix 1769 Version-
Rockwellautomation ≫ Compactlogix 5370 Version-
Rockwellautomation ≫ Compactlogix 5380 Version-
Rockwellautomation ≫ Compactlogix 5480 Version-
Rockwellautomation ≫ Controllogix 5550 Version-
Rockwellautomation ≫ Controllogix 5560 Version-
Rockwellautomation ≫ Controllogix 5570 Version-
Rockwellautomation ≫ Controllogix 5580 Version-
Rockwellautomation ≫ Drivelogix 1794-l34 Version-
Rockwellautomation ≫ Drivelogix 5560 Version-
Rockwellautomation ≫ Drivelogix 5730 Version-
Rockwellautomation ≫ Guardlogix 5570 Version-
Rockwellautomation ≫ Guardlogix 5580 Version-
Rockwellautomation ≫ Softlogix 5800 Version-
05.03.2026: CISA Known Exploited Vulnerabilities (KEV) Catalog
Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
SchwachstelleMultiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to be discovered. This key is used to verify Logix controllers are communicating with Rockwell Automation design software. If successfully exploited, this vulnerability could allow an unauthorized application to connect with Logix controllers. To leverage this vulnerability, an unauthorized user would require network access to the controller.
BeschreibungApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 16.25% | 0.947 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.