CVE-2024-6077

Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix® 5380 Vulnerable to DoS vulnerability via CIP

Description

A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.

Remediation

Solution:

  • Affected Family         First Known in Software/Firmware Version         Corrected in Software/Firmware Version         CompactLogix 5380               v.32 .011         v33.017, v34.014, v35.013, v36.011 and later         CompactLogix 5380 Process         v.33.011         v33.017, v34.014, v35.013, v36.011 and later         Compact GuardLogix 5380 SIL 2         v.32.013         v33.017, v34.014, v35.013, v36.011 and later         Compact GuardLogix 5380 SIL 3         v.32.011         v33.017, v34.014, v35.013, v36.011 and later         CompactLogix 5480         v.32.011         v33.017, v34.014, v35.013, v36.011 and later         ControlLogix® 5580         v.32.011         v33.017, v34.014, v35.013, v36.011 and later         ControlLogix® 5580 Process         v.33.011         v33.017, v34.014, v35.013, v36.011 and later         GuardLogix 5580         v.32.011         v33.017, v34.014, v35.013, v36.011 and later         1756-EN4         v2.001         v6.001 and later       Mitigations and Workarounds Customers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. * Users who do not wish to use CIP security can disable the feature per device. See "Disable CIP Security" in Chapter 2 of "CIP Security with Rockwell Automation Products" (publication SECURE-AT001) For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight  to minimize the risk of the vulnerability. Customers can use Stakeholder-Specific Vulnerability Categorization https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc  to generate more environment-specific prioritization.

Category

8.7
CVSS
Severity: High
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.05%
Vendor Advisory rockwellautomation.com
Affected: Rockwell Automation CompactLogix 5380
Affected: Rockwell Automation CompactLogix 5380 Process
Affected: Rockwell Automation Compact GuardLogix 5380 SIL 2
Affected: Rockwell Automation Compact GuardLogix 5380 SIL 3
Affected: Rockwell Automation CompactLogix 5480
Affected: Rockwell Automation ControlLogix® 5580
Affected: Rockwell Automation ControlLogix® 5580 Process
Affected: Rockwell Automation GuardLogix 5580
Affected: Rockwell Automation 1756-EN4
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-6077?
CVE-2024-6077 has been scored as a high severity vulnerability.
How to fix CVE-2024-6077?
To fix CVE-2024-6077: Affected Family         First Known in Software/Firmware Version         Corrected in Software/Firmware Version         CompactLogix 5380               v.32 .011         v33.017, v34.014, v35.013, v36.011 and later         CompactLogix 5380 Process         v.33.011         v33.017, v34.014, v35.013, v36.011 and later         Compact GuardLogix 5380 SIL 2         v.32.013         v33.017, v34.014, v35.013, v36.011 and later         Compact GuardLogix 5380 SIL 3         v.32.011         v33.017, v34.014, v35.013, v36.011 and later         CompactLogix 5480         v.32.011         v33.017, v34.014, v35.013, v36.011 and later         ControlLogix® 5580         v.32.011         v33.017, v34.014, v35.013, v36.011 and later         ControlLogix® 5580 Process         v.33.011         v33.017, v34.014, v35.013, v36.011 and later         GuardLogix 5580         v.32.011         v33.017, v34.014, v35.013, v36.011 and later         1756-EN4         v2.001         v6.001 and later       Mitigations and Workarounds Customers who are unable to upgrade to the corrected software versions are encouraged to apply the following risk mitigations. * Users who do not wish to use CIP security can disable the feature per device. See "Disable CIP Security" in Chapter 2 of "CIP Security with Rockwell Automation Products" (publication SECURE-AT001) For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight  to minimize the risk of the vulnerability. Customers can use Stakeholder-Specific Vulnerability Categorization https://www.cisa.gov/stakeholder-specific-vulnerability-categorization-ssvc  to generate more environment-specific prioritization.
Is CVE-2024-6077 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-6077 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-6077?
CVE-2024-6077 affects Rockwell Automation CompactLogix 5380, Rockwell Automation CompactLogix 5380 Process, Rockwell Automation Compact GuardLogix 5380 SIL 2, Rockwell Automation Compact GuardLogix 5380 SIL 3, Rockwell Automation CompactLogix 5480, Rockwell Automation ControlLogix® 5580, Rockwell Automation ControlLogix® 5580 Process, Rockwell Automation GuardLogix 5580, Rockwell Automation 1756-EN4.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.