CVE-2024-5659

Rockwell Automation Multicast Request Causes major nonrecoverable fault on Select Controllers

Description

Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the same network to result in a major nonrecoverable fault(MNRF/Assert). This vulnerability could be exploited by sending abnormal packets to the mDNS port. If exploited, the availability of the device would be compromised.

Remediation

Solution:

  • Affected Product First Known in firmware revision Corrected in firmware revision ControlLogix® 5580 V34.011 V34.014, V35.013, V36.011 and later GuardLogix 5580 V34.011 V34.014, V35.013, V36.011 and later 1756-EN4 V4.001 V6.001 and later CompactLogix 5380 V34.011 V34.014, V35.013, V36.011 and later Compact GuardLogix  5380 V34.011 V34.014, V35.013, V36.011 and later CompactLogix 5480 V34.011 V34.014, V35.013, V36.011 and later Mitigations and Workarounds Users using the affected software and who are not able to upgrade to one of the corrected versions are encouraged to apply the risk mitigations, where possible. ·       Users who do not use CIP Security with Rockwell Automation Products Application Technique https://literature.rockwellautomation.com/idc/groups/literature/documents/at/secure-at001_-en-p.pdf ·       Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight

Category

8.3
CVSS
Severity: High
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.02%
Vendor Advisory rockwellautomation.com
Affected: Rockwell Automation ControlLogix® 5580
Affected: Rockwell Automation GuardLogix 5580
Affected: Rockwell Automation 1756-EN4
Affected: Rockwell Automation CompactLogix 5380
Affected: Rockwell Automation Compact GuardLogix 5380
Affected: Rockwell Automation CompactLogix 5480
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-5659?
CVE-2024-5659 has been scored as a high severity vulnerability.
How to fix CVE-2024-5659?
To fix CVE-2024-5659: Affected Product First Known in firmware revision Corrected in firmware revision ControlLogix® 5580 V34.011 V34.014, V35.013, V36.011 and later GuardLogix 5580 V34.011 V34.014, V35.013, V36.011 and later 1756-EN4 V4.001 V6.001 and later CompactLogix 5380 V34.011 V34.014, V35.013, V36.011 and later Compact GuardLogix  5380 V34.011 V34.014, V35.013, V36.011 and later CompactLogix 5480 V34.011 V34.014, V35.013, V36.011 and later Mitigations and Workarounds Users using the affected software and who are not able to upgrade to one of the corrected versions are encouraged to apply the risk mitigations, where possible. ·       Users who do not use CIP Security with Rockwell Automation Products Application Technique https://literature.rockwellautomation.com/idc/groups/literature/documents/at/secure-at001_-en-p.pdf ·       Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Is CVE-2024-5659 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-5659 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-5659?
CVE-2024-5659 affects Rockwell Automation ControlLogix® 5580, Rockwell Automation GuardLogix 5580, Rockwell Automation 1756-EN4, Rockwell Automation CompactLogix 5380, Rockwell Automation Compact GuardLogix 5380, Rockwell Automation CompactLogix 5480.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.