CVE-2022-2179

ICSA-22-188-01 Rockwell Automation MicroLogix Improper Restriction of Rendered UI Layers or Frames

Description

The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks.

Remediation

Workaround:

  • Rockwell Automation encourages those using the affected software to implement the mitigations below to minimize risk. Additionally, Rockwell Automation encourages users to combine risk mitigations with security best practices (also provided below) to deploy a defense-in-depth strategy. Disable the web server where possible (this component is an optional feature and disabling it will not disrupt the intended use of the device). Configure firewalls to disallow network communication through HTTP/Port 80 If applying the mitigations noted above are not possible, please see Rockwell Automation’s Knowledgebase article QA43240 Security Best Practices. For more information, please see the industrial security advisory from Rockwell Automation.

Category

6.5
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.40%
Vendor Advisory custhelp.com
Affected: Rockwell Automation MicroLogix 1400
Affected: Rockwell Automation MicroLogix 1100
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-2179?
CVE-2022-2179 has been scored as a medium severity vulnerability.
How to fix CVE-2022-2179?
As a workaround for remediating CVE-2022-2179: Rockwell Automation encourages those using the affected software to implement the mitigations below to minimize risk. Additionally, Rockwell Automation encourages users to combine risk mitigations with security best practices (also provided below) to deploy a defense-in-depth strategy. Disable the web server where possible (this component is an optional feature and disabling it will not disrupt the intended use of the device). Configure firewalls to disallow network communication through HTTP/Port 80 If applying the mitigations noted above are not possible, please see Rockwell Automation’s Knowledgebase article QA43240 Security Best Practices. For more information, please see the industrial security advisory from Rockwell Automation.
Is CVE-2022-2179 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-2179 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-2179?
CVE-2022-2179 affects Rockwell Automation MicroLogix 1400, Rockwell Automation MicroLogix 1100.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.