Rockwell Automation’s ControlLogix Conundrum: The NULL Pointer of No Return!

View CSAF: Rockwell Automation’s ControlLogix 5580 is feeling a bit under the weather with a NULL Pointer Dereference vulnerability. It’s a denial-of-service drama waiting to happen, remotely exploitable with low attack complexity. The fix? Upgrade to version 35.014 or later and keep your controller’s mood swings in check!

Pro Dashboard

Hot Take:

Rockwell Automation’s ControlLogix 5580 has a vulnerability so serious, it could make your controller throw a tantrum worse than a toddler who just dropped their ice cream. Quick, upgrade to version 35.014 before it decides to ghost you forever!

Key Points:

  • ControlLogix 5580 has a major vulnerability with a CVSS v4 score of 8.2.
  • The vulnerability allows for remote exploitation with low attack complexity.
  • Successful exploitation can cause a nonrecoverable fault in the controller.
  • Rockwell Automation recommends upgrading to version 35.014 or later.
  • CISA suggests implementing defensive measures and using VPNs for remote access.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?