CVE-2024-6242

high

Description

A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.

References

https://www.securityweek.com/security-bypass-vulnerability-found-in-rockwell-automation-logix-controllers/

https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-09

https://claroty.com/team82/research/bypassing-rockwell-automation-logix-controllers-local-chassis-security-protection

https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1682.html

Details

Source: Mitre, NVD

Published: 2024-08-01

Updated: 2024-08-01

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

CVSS v4

Base Score: 7.3

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H

Severity: High