cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-6207,https://securityvulnerability.io/vulnerability/CVE-2024-6207,Exploitable Vulnerability Could Prevent Access to Legitimate Users and End Connections to Connected Devices,"The vulnerability allows a threat actor to exploit a flaw in the processing of specially crafted CIP messages sent to Rockwell Automation Controllers. This can lead to unauthorized disruption of service, preventing legitimate users from gaining access and possibly severing connections to devices within the network, including workstations. Recovery from such an incident necessitates a download process, which forcibly halts any ongoing controller operations, impacting production and operational efficiency.",Rockwell Automation,"Controllogix® 5580,Controllogix® 5580 Process,Guardlogix 5580,Compactlogix 5380,Compact Guardlogix 5380 Sil 2,Compact Guardlogix 5380 Sil 3,Compactlogix 5480,Factorytalk® Logix Echo",7.5,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-10-14T21:15:00.000Z,0 CVE-2024-8626,https://securityvulnerability.io/vulnerability/CVE-2024-8626,Denial of Service Vulnerability in Rockwell Automation Products,"A denial-of-service vulnerability caused by a memory leak exists in certain products from Rockwell Automation. This vulnerability can be exploited by a malicious actor performing multiple operations on designated web pages within the affected products. The exploitation of this vulnerability renders the systems fully unavailable, necessitating a power cycle to return to regular operational status. This poses significant risks to reliability and operational continuity in environments reliant on these automation solutions.",Rockwell Automation,"Compactlogix 5380 Controllers,Compact Guardlogix® 5380 Controllers,Compactlogix 5480 Controllers,Guardlogix 5580 Controllers,1756-en4tr",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-08T16:35:04.513Z,0 CVE-2024-5659,https://securityvulnerability.io/vulnerability/CVE-2024-5659,Rockwell Automation Affected by Vulnerability Leading to Major Network Disruption,"Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the same network to result in a major nonrecoverable fault(MNRF/Assert). This vulnerability could be exploited by sending abnormal packets to the mDNS port. If exploited, the availability of the device would be compromised.",Rockwell Automation,"Controllogix® 5580,Guardlogix 5580,1756-en4,Compactlogix 5380,Compact Guardlogix 5380,Compactlogix 5480",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-06-14T16:42:20.699Z,0 CVE-2022-3752,https://securityvulnerability.io/vulnerability/CVE-2022-3752,Rockwell Automation GuardLogix and ControlLogix controllers Vulnerable to Denial-Of-Service Attack,"An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online and continue normal operation. ",Rockwell Automation,"Compactlogix 5480,Controllogix 5580,Guardlogix 5580,Compact Guardlogix 5380,Compactlogix 5380",8.6,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2022-12-19T22:23:36.836Z,0 CVE-2022-1797,https://securityvulnerability.io/vulnerability/CVE-2022-1797,Rockwell Automation Logix Controllers Uncontrolled Resource Consumption,"A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online.",Rockwell Automation,"Compactlogix 5380 Controllers,Compact Guardlogix 5380 Controllers,Compactlogix 5480 Controllers,Controllogix 5580 Controllers,Guardlogix 5580 Controllers,Compactlogix 5370 Controllers,Compact Guardlogix 5370 Controllers,Controllogix 5570 Controllers,Guardlogix 5570 Controllers",6.8,MEDIUM,0.0006699999794363976,false,,false,false,false,,,false,false,,2022-06-02T14:15:00.000Z,0 CVE-2022-1161,https://securityvulnerability.io/vulnerability/CVE-2022-1161,ICSA-22-090-05 Rockwell Automation Logix Controllers,"An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change one and not the other.",Rockwell Automation,"1768 Compactlogix Controllers,1769 Compactlogix Controllers,Compactlogix 5370 Controllers,Compactlogix 5380 Controllers,Compactlogix 5480 Controllers,Compact Guardlogix 5370 Controllers,Compact Guardlogix 5380 Controllers,Controllogix 5550 Controllers,Controllogix 5560 Controllers,Controllogix 5570 Controllers,Controllogix 5580 Controllers,Guardlogix 5560 Controllers,Guardlogix 5570 Controllers,Guardlogix 5580 Controllers,Flexlogix 1794-l34 Controllers,Drivelogix 5730 Controllers,Softlogix 5800 Controllers",10,CRITICAL,0.004540000110864639,false,,false,false,false,,,false,false,,2022-04-11T20:15:00.000Z,0