Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-6207", "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "state": "PUBLISHED", "assignerShortName": "Rockwell", "dateReserved": "2024-06-20T16:08:17.052Z", "datePublished": "2024-10-14T20:53:49.191Z", "dateUpdated": "2024-10-15T14:43:19.768Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "ControlLogix\u00ae 5580", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "V28.011"}]}, {"defaultStatus": "unaffected", "product": "ControlLogix\u00ae 5580 Process", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "V33.011"}]}, {"defaultStatus": "unaffected", "product": "GuardLogix 5580", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "V31.011"}]}, {"defaultStatus": "unaffected", "product": "CompactLogix 5380", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "V28.011"}]}, {"defaultStatus": "unaffected", "product": "Compact GuardLogix 5380 SIL 2", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "V31.011"}]}, {"defaultStatus": "unaffected", "product": "Compact GuardLogix 5380 SIL 3", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "V32.013"}]}, {"defaultStatus": "unaffected", "product": "CompactLogix 5480", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "V32.011"}]}, {"defaultStatus": "unaffected", "product": "FactoryTalk\u00ae Logix Echo", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "V33.011"}]}], "datePublic": "2024-10-10T13:00:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p><a target=\"_blank\" rel=\"nofollow\">CVE-2024-6207</a> IMPACT</p><p>A denial-of-service vulnerability exists in the affected products that will cause the device to result in a major nonrecoverable fault (MNRF) when it receives an invalid CIP request. To exploit this vulnerability a malicious user must chain this exploits with <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html\">CVE 2021-22681</a> and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running. </p>"}], "value": "CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html \u00a0and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running."}], "impacts": [{"capecId": "CAPEC-100", "descriptions": [{"lang": "en", "value": "CAPEC-100 Overflow Buffers"}]}], "metrics": [{"cvssV4_0": {"Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}, {"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell", "dateUpdated": "2024-10-14T20:53:49.191Z"}, "references": [{"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1707.html"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>AFFECTED PRODUCTS AND SOLUTION</p><table><tbody><tr><td>Affected Product<br></td><td>First Known in firmware revision</td><td>Corrected in firmware revision</td></tr><tr><td>ControlLogix\u00ae 5580</td><td>V28.011</td><td>V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>ControlLogix\u00ae 5580 Process</td><td>V33.011</td><td>V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>GuardLogix 5580</td><td>V31.011</td><td> V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>CompactLogix 5380</td><td>V28.011</td><td> V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>Compact GuardLogix 5380 SIL 2</td><td>V31.011</td><td>V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>Compact GuardLogix 5380 SIL 3</td><td>V32.013</td><td>V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>CompactLogix 5480</td><td>V32.011</td><td>V33.017, V34.014, V35.013, V36.011 and later</td></tr><tr><td>FactoryTalk\u00ae Logix Echo </td><td>V33.011</td><td>V34.014, V35.013, V36.011 and later</td></tr></tbody></table>\n\n<br>"}], "value": "AFFECTED PRODUCTS AND SOLUTION\n\nAffected Product\nFirst Known in firmware revisionCorrected in firmware revisionControlLogix\u00ae 5580V28.011V33.017, V34.014, V35.013, V36.011 and laterControlLogix\u00ae 5580 ProcessV33.011V33.017, V34.014, V35.013, V36.011 and laterGuardLogix 5580V31.011\u00a0V33.017, V34.014, V35.013, V36.011 and laterCompactLogix 5380V28.011\u00a0V33.017, V34.014, V35.013, V36.011 and laterCompact GuardLogix 5380 SIL 2V31.011V33.017, V34.014, V35.013, V36.011 and laterCompact GuardLogix 5380 SIL 3V32.013V33.017, V34.014, V35.013, V36.011 and laterCompactLogix 5480V32.011V33.017, V34.014, V35.013, V36.011 and laterFactoryTalk\u00ae Logix Echo V33.011V34.014, V35.013, V36.011 and later"}], "source": {"discovery": "INTERNAL"}, "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"affected": [{"vendor": "rockwellautomation", "product": "compactlogix_5380_firmware", "cpes": ["cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "28.011", "status": "affected", "lessThan": "33.017", "versionType": "custom"}, {"version": "34.0", "status": "affected", "lessThan": "34.014", "versionType": "custom"}, {"version": "35.0", "status": "affected", "lessThan": "35.013", "versionType": "custom"}, {"version": "36.0", "status": "affected", "lessThan": "36.011", "versionType": "custom"}]}, {"vendor": "rockwellautomation", "product": "controllogix_5580_process_firmware", "cpes": ["cpe:2.3:o:rockwellautomation:controllogix_5580_process_firmware:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "33.011", "status": "affected", "lessThan": "33.017", "versionType": "custom"}, {"version": "34.0", "status": "affected", "lessThan": "34.014", "versionType": "custom"}, {"version": "35.0", "status": "affected", "lessThan": "35.013", "versionType": "custom"}, {"version": "36.0", "status": "affected", "lessThan": "36.011", "versionType": "custom"}]}, {"vendor": "rockwellautomation", "product": "guardlogix_5580_firmware", "cpes": ["cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "31.011", "status": "affected", "lessThan": "33.017", "versionType": "custom"}, {"version": "34.0", "status": "affected", "lessThan": "34.014", "versionType": "custom"}, {"version": "35.0", "status": "affected", "lessThan": "35.013", "versionType": "custom"}, {"version": "36.0", "status": "affected", "lessThan": "36.011", "versionType": "custom"}]}, {"vendor": "rockwellautomation", "product": "controllogix_5580_process_firmware", "cpes": ["cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "32.011", "status": "affected", "lessThan": "33.017", "versionType": "custom"}, {"version": "34.0", "status": "affected", "lessThan": "34.014", "versionType": "custom"}, {"version": "35.0", "status": "affected", "lessThan": "35.013", "versionType": "custom"}, {"version": "36.0", "status": "affected", "lessThan": "36.011", "versionType": "custom"}]}, {"vendor": "rockwellautomation", "product": "compact_guardlogix_5380_sil3_firmware", "cpes": ["cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_sil3_firmware:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "32.013", "status": "affected", "lessThan": "33.017", "versionType": "custom"}, {"version": "34.0", "status": "affected", "lessThan": "34.014", "versionType": "custom"}, {"version": "35.0", "status": "affected", "lessThan": "35.013", "versionType": "custom"}, {"version": "36.0", "status": "affected", "lessThan": "36.011", "versionType": "custom"}]}, {"vendor": "rockwellautomation", "product": "factorytalk_logix_echo", "cpes": ["cpe:2.3:a:rockwellautomation:factorytalk_logix_echo:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "33.011", "status": "affected", "lessThan": "34.014", "versionType": "custom"}, {"version": "35.0", "status": "affected", "lessThan": "35.013", "versionType": "custom"}, {"version": "36.0", "status": "affected", "lessThan": "36.011", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-15T14:11:41.281080Z", "id": "CVE-2024-6207", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-15T14:43:19.768Z"}}]}}