cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-24478,https://securityvulnerability.io/vulnerability/CVE-2025-24478,Denial-of-Service Vulnerability in Rockwell Automation Products,"A denial-of-service vulnerability has been identified within Rockwell Automation products that allows remote, non-privileged users to exploit the system. By sending specially crafted requests, an attacker could trigger a nonrecoverable fault, rendering the affected system inoperable. This vulnerability poses significant risks to operational continuity, emphasizing the need for immediate remediation to safeguard against potential exploitation.",Rockwell Automation,"Guardlogix 5580 Sil 3,Compact Guardlogix 5380 Sil 3",7.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-28T18:41:30.887Z,0 CVE-2024-6207,https://securityvulnerability.io/vulnerability/CVE-2024-6207,Exploitable Vulnerability Could Prevent Access to Legitimate Users and End Connections to Connected Devices,"The vulnerability allows a threat actor to exploit a flaw in the processing of specially crafted CIP messages sent to Rockwell Automation Controllers. This can lead to unauthorized disruption of service, preventing legitimate users from gaining access and possibly severing connections to devices within the network, including workstations. Recovery from such an incident necessitates a download process, which forcibly halts any ongoing controller operations, impacting production and operational efficiency.",Rockwell Automation,"Controllogix® 5580,Controllogix® 5580 Process,Guardlogix 5580,Compactlogix 5380,Compact Guardlogix 5380 Sil 2,Compact Guardlogix 5380 Sil 3,Compactlogix 5480,Factorytalk® Logix Echo",7.5,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-10-14T21:15:00.000Z,0