- What is the severity of CVE-2024-5659?
- CVE-2024-5659 has been scored as a high severity vulnerability.
- How to fix CVE-2024-5659?
- To fix CVE-2024-5659: Affected Product First Known in firmware revision Corrected in firmware revision ControlLogix® 5580 V34.011 V34.014, V35.013, V36.011 and later GuardLogix 5580 V34.011 V34.014, V35.013, V36.011 and later 1756-EN4 V4.001 V6.001 and later CompactLogix 5380 V34.011 V34.014, V35.013, V36.011 and later Compact GuardLogix 5380 V34.011 V34.014, V35.013, V36.011 and later CompactLogix 5480 V34.011 V34.014, V35.013, V36.011 and later Mitigations and Workarounds Users using the affected software and who are not able to upgrade to one of the corrected versions are encouraged to apply the risk mitigations, where possible. · Users who do not use CIP Security with Rockwell Automation Products Application Technique https://literature.rockwellautomation.com/idc/groups/literature/documents/at/secure-at001_-en-p.pdf · Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
- Is CVE-2024-5659 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2024-5659 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2024-5659?
- CVE-2024-5659 affects Rockwell Automation ControlLogix® 5580, Rockwell Automation GuardLogix 5580, Rockwell Automation 1756-EN4, Rockwell Automation CompactLogix 5380, Rockwell Automation Compact GuardLogix 5380, Rockwell Automation CompactLogix 5480.