Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet. ![]() Rockwell Automation recommends users upgrade the Studio 5000 Logix Emulate to v34.00 or later.ĬISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Rockwell Automation reported this vulnerability to CISA. COMPANY HEADQUARTERS LOCATION: United States.CRITICAL INFRASTRUCTURE SECTORS: Multiple Sectors.A CVSS v3 base score of 7.8 has been assigned the CVSS vector string is ( AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software.ĬVE-2022-3156 has been assigned to this vulnerability. Studio 5000 Logix Emulate v.20-33 users are granted elevated permissions on certain product services. ![]() The following versions of Studio 5000 Logix Emulate are affected:ģ.2 VULNERABILITY OVERVIEW 3.2.1 IMPROPER ACCESS CONTROL CWE-284 Successful exploitation of this vulnerability could allow a malicious user to perform remote code execution, potentially impacting the confidentiality, integrity, and availability of the software.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |