- What is the severity of CVE-2022-2179?
- CVE-2022-2179 has been scored as a medium severity vulnerability.
- How to fix CVE-2022-2179?
- As a workaround for remediating CVE-2022-2179: Rockwell Automation encourages those using the affected software to implement the mitigations below to minimize risk. Additionally, Rockwell Automation encourages users to combine risk mitigations with security best practices (also provided below) to deploy a defense-in-depth strategy. Disable the web server where possible (this component is an optional feature and disabling it will not disrupt the intended use of the device). Configure firewalls to disallow network communication through HTTP/Port 80 If applying the mitigations noted above are not possible, please see Rockwell Automation’s Knowledgebase article QA43240 Security Best Practices. For more information, please see the industrial security advisory from Rockwell Automation.
- Is CVE-2022-2179 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2022-2179 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2022-2179?
- CVE-2022-2179 affects Rockwell Automation MicroLogix 1400, Rockwell Automation MicroLogix 1100.