Rockwellautomation

Compact Guardlogix 5380 Firmware

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Veröffentlicht 08.10.2024 17:15:56
  • Zuletzt bearbeitet 27.02.2025 18:47:11

Due to a memory leak, a denial-of-service vulnerability exists in the Rockwell Automation affected products. A malicious actor could exploit this vulnerability by performing multiple actions on certain web pages of the product causing the affected pr...

  • EPSS 0.23%
  • Veröffentlicht 14.06.2024 17:15:51
  • Zuletzt bearbeitet 27.02.2025 15:15:08

Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the same network to result in a major nonrecoverable fault(MNRF/Assert). This vulnerability could be exploited by sending abnormal packets to the mDNS port....

  • EPSS 0.06%
  • Veröffentlicht 15.04.2024 22:15:09
  • Zuletzt bearbeitet 04.03.2025 17:11:31

A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, Compa...

  • EPSS 0.43%
  • Veröffentlicht 19.12.2022 23:15:10
  • Zuletzt bearbeitet 21.11.2024 07:20:10

An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If t...

  • EPSS 0.51%
  • Veröffentlicht 16.12.2022 21:15:08
  • Zuletzt bearbeitet 21.11.2024 07:18:56

A vulnerability exists in the Rockwell Automation controllers that allows a malformed CIP request to cause a major non-recoverable fault (MNRF) and a denial-of-service condition (DOS).

  • EPSS 0.03%
  • Veröffentlicht 02.06.2022 14:15:33
  • Zuletzt bearbeitet 21.11.2024 06:41:29

A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a u...

  • EPSS 0.12%
  • Veröffentlicht 11.04.2022 20:15:18
  • Zuletzt bearbeitet 21.11.2024 06:40:09

An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the execut...

  • EPSS 0.03%
  • Veröffentlicht 01.04.2022 23:15:12
  • Zuletzt bearbeitet 21.11.2024 06:40:09

Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user.