Your review has been sent successfully

Rockwell Automation Alert

2695
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

21 March, 2021

● Critical

2021-2654

All

Description:

Rockwell Automation has released a security alert to address several vulnerabilities in the following products:

  • Rockwell software
    • RSLogix 5000: Versions 16 through 20
    • Studio 5000 Logix Designer: Versions 21 and later
    • FactoryTalk Security, part of the FactoryTalk Services Platform, if configured and deployed v2.10 and later
  • Rockwell Logix Controllers
    • CompactLogix 1768
    • CompactLogix 1769
    • CompactLogix 5370
    • CompactLogix 5380
    • CompactLogix 5480
    • ControlLogix 5550
    • ControlLogix 5560
    • ControlLogix 5570
    • ControlLogix 5580
    • DriveLogix 5560
    • DriveLogix 5730
    • DriveLogix 1794-L34
    • Compact GuardLogix 5370
    • Compact GuardLogix 5380
    • GuardLogix 5570
    • GuardLogix 5580
    • SoftLogix 5800

Threats:

Attacker could exploit this vulnerability by doing the following:

  • Authentication bypass

Best practice and Recommendations:

Rockwell Automation recommends the following mitigations and compensating controls in order to reduce risk associated with these vulnerabilities:

  • Minimizing network exposure for all control system devices and/or systems
  • Locating control system networks and devices behind firewalls and isolating them from the enterprise/business network
  • Restricting or blocking traffic on TCP 44818 from outside of the industrial control system network zone
  • When remote access is required, use secure methods such as virtual private networks (VPNs)

Last updated at 21 March, 2021

Rate the content

rate-icon
up icon