ControlLogix Crisis: Rockwell Automation’s Vulnerability Could Bring Your Systems to a Halt!

View CSAF: Rockwell Automation’s ControlLogix 5580 and GuardLogix 5580 have a new vulnerability allowing for remote denial-of-service attacks. With a CVSS v4 score of 8.7, it’s time to update your software and take defensive measures. Remember, nothing ruins a good day like a network meltdown!

Pro Dashboard

Hot Take:

Looks like Rockwell Automation’s ControlLogix 5580 and GuardLogix 5580 are getting a crash course in “How to Play Dead” thanks to a new vulnerability. If you thought your PLCs were performing well, think again—because they might just be taking an unscheduled nap!

Key Points:

  • Rated 8.7 on the CVSS v4 scale—pretty serious stuff.
  • Remotely exploitable with low attack complexity.
  • Denial-of-service vulnerability due to improper checks.
  • Affects ControlLogix 5580 and GuardLogix 5580 models, versions v34.011 and later.
  • Rockwell Automation has released fixes; update your devices to v34.014 and later.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?