A high-severity security bypass vulnerability, tracked as CVE-2024-6242 (CVSS Base Score v4.0 of 7.3), impacts Rockwell Automation ControlLogix 1756 devices. An attacker can exploit the vulnerability to execute (CIP) programming and configuration commands.
“A vulnerability exists in the affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller.” reads the published by the vendor. “If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.”
The vulnerability impacts the following versions of ControlLogix, GuardLogix, and 1756 ControlLogix I/O Modules:
The researcher Sharon Brizinov of Claroty Research – Team82 reported this vulnerability to Rockwell Automation.
An attacker needs network access to the device to exploit this vulnerability. If successful, the attacker could bypass security restrictions and send elevated commands to the PLC CPU.
“Team82 has discovered and disclosed a security bypass vulnerability in Rockwell Automation ControlLogix 1756 devices. Our technique allowed us to bypass the trusted slot feature implemented by Rockwell that enforces security policies and allows the controller to deny communication via untrusted paths on the local chassis.” reads the published by Claroty. “The vulnerability we found, before it was fixed, allowed an attacker to jump between local backplane slots within a 1756 chassis using CIP routing, traversing the security boundary meant to protect the CPU from untrusted cards. “
Rockwell the flaw and users are urged to apply it immediately. with mitigation advice.
“This vulnerability had the potential to expose critical control systems to unauthorized access over the CIP protocol that originated from untrusted chassis slots.” concludes Claroty.
Follow me on Twitter: and and Mastodon
(SecurityAffairs – hacking, Rockwell Automation ControlLogix)