Rockwell Automation Product Security Advisory

Overview

 

Rockwell Automation has released a security update that addresses a vulnerability in the ManageEngine family of products. Users of affected products are advised to update to the latest version.

Rockwell Automation: A provider of control systems and robotics solutions for industrial automation

 

Affected Products

 

CVE-2021-22681

  • software : RSLogix 5000, Studio 5000, Logix Designer
  • controllers: CompactLogix(1768, 1769, 5370, 5380, 5480, 5550, 5560, 5560, 5570, 5580), DriveLogix(5560, 5730, 1794-L34), Compact GuardLogix(5370, 5380), GuardLogix(5570, 5580), SoftLogix(5800)
  • RSLogix 5000 versions 16 through 20
  • Studio 5000 Logix Designer version 21 or later, and controllers running those versions

 

CVE-2022-1159

  • software: Studio 5000 Logix Designer
  • controllers: ControlLogix(5580), GuardLogix(5580), CompactLogix(5380), CompactLogix(5480), Compact GuardLogix(5380)
  • Studio 5000 Logix Designer v28 or later, and controllers running those versions

 

CVE-2023-3595

  • 1756-EN2T Series(A, B, C), 1756-EN2TK Series(A, B, C), 1756-EN2TXT Series(A, B, C) 5.008 or below and 5.028 versions
  • 1756-EN2T Series(D), 1756-EN2TK Series(D), 1756-EN2TXT Series(D) 11.003 or below
  • 1756-EN2TP Series(A), 1756-EN2TPK Series(A), 1756-EN2TPXT Series(A) 11.003 or below
  • 1756-EN2TR Series(A, B), 1756-EN2TRK Series(A, B), 1756-EN2TRXT Series(A, B) 5.008 or below and 5.028 versions
  • 1756-EN2TR Series(C), 1756-EN2TRK Series(C), 1756-EN2TRXT Series(C) 11.003 or below
  • 1756-EN2F Series(A, B), 1756-EN2FK Series(A, B) 5.008 or below and 5.028 versions
  • 1756-EN2F Series(C), 1756-EN2FK Series(C) 11.003 or below
  • 1756-EN3TR Series(A), 1756-EN3TRK Series(A) 5.008 or below and 5.028 versions
  • 1756-EN3TR Series(B), 1756-EN3TRK Series(B) 11.003 or below
  • 1756-EN4TR Series(A), 1756-EN4TRK Series(A), 1756-EN4TRXT Series(A) 5.001 or below
     

CVE-2023-3596

  • 1756-EN2T Series(A, B, C), 1756-EN2TK Series(A, B, C), 1756-EN2TXT Series(A, B, C) 5.008 or below and 5.028 versions
  • 1756-EN2T Series(D), 1756-EN2TK Series(D), 1756-EN2TXT Series(D) 11.003 or below
  • 1756-EN2TP Series(A), 1756-EN2TPK Series(A), 1756-EN2TPXT Series(A) 11.003 or below
  • 1756-EN2TR Series(A, B), 1756-EN2TRK Series(A, B), 1756-EN2TRXT Series(A, B) 5.008 and below and 5.028 and below versions
  • 1756-EN2TR Series(C), 1756-EN2TRK Series(C), 1756-EN2TRXT Series(C) 11.003 or below
  • 1756-EN2F Series(A, B), 1756-EN2FK Series(A, B) 5.008 or below and 5.028 versions

 

CVE-2023-46290

  • FactoryTalk Service Platform version 2.74

 

CVE-2024-21914

  • FactoryTalk View ME versions prior to 14 

 

CVE-2024-21915

  • FactoryTalk Service Platform versions prior to 2.74

 

CVE-2024-21917

  • FactoryTalk Service Platform 6.31 or below

 

Resolved Vulnerabilities

 

authentication Bypass Vulnerability in Logix Controllers(CVE-2021-22681) [2]

arbitrary Controller Code Injection Vulnerability in Studio 5000 Logix Designer(CVE-2022-1159) [3]

remote code execution vulnerability and one other vulnerability in Select Communication Modules(CVE-2023-3595, CVE-2023-3596) [4]

improper Authentication Vulnerability in FactoryTalk Service Platform(CVE-2023-46290) [5]

xSS Vulnerability in FactoryTalk View ME(CVE-2024-21914) [6]

elevation of Privilege Vulnerability in FactoryTalk Service Platform(CVE-2024-21915) [7]

weak Authentication and Session Management Vulnerability in FactoryTalk Service Platform(CVE-2024-21917) [8]

 

Vulnerability Patches

 

vulnerability patches have been made available in the latest update. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.

CVE-2021-22681

– Based on the referenced site[2], users of affected versions should refer to the ‘Risk Mitigation and Recommended User Actions’ section

CVE-2022-1159

– Based on the reference site[3], users of affected versions should refer to ‘Risk Mitigation & User Action’

CVE-2023-3595, CVE-2023-3596

– Based on the reference site[4], users of affected versions should refer to ‘Risk Mitigation & User Action’

CVE-2023-46290

– Users of affected versions should apply the update based on the reference site[5]

CVE-2024-21914

– Users of affected versions should apply the update based on the reference site[6]

CVE-2024-21915

– Users of affected versions should update based on the reference site[7]

CVE-2024-21917

– Users of affected versions should update based on the reference site[8]

 

Referenced Sites

 

[1] https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1672.html

[2] https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html

[3] https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1586.html

[4] https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1633.html

[5] https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1655.html

[6] https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1663.html

[7] https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1662.html

[8] https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1660.html