Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Compact_guardlogix_5380_sil_3_firmware
(Rockwellautomation)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-10-14 | CVE-2024-6207 | CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running. | Compact_guardlogix_5380_sil_2_firmware, Compact_guardlogix_5380_sil_3_firmware, Compactlogix_5380_firmware, Compactlogix_5480_firmware, Controllogix_5580_firmware, Controllogix_5580_process_firmware, Factorytalk_logix_echo_firmware, Guardlogix_5580_firmware | 7.5 | ||
2024-09-12 | CVE-2024-6077 | A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover. | 1756\-En4_firmware, Compact_guardlogix_5380_sil_2_firmware, Compact_guardlogix_5380_sil_3_firmware, Compactlogix_5380_firmware, Compactlogix_5480_firmware, Controllogix_5580_firmware, Guardlogix_5580_firmware | 7.5 |