Article Details

Scrape Timestamp (UTC): 2024-08-05 06:10:20.624

Source: https://thehackernews.com/2024/08/critical-flaw-in-rockwell-automation.html

Original Article Text

Click to Toggle View

Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access. A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be exploited to execute common industrial protocol (CIP) programming and configuration commands. The flaw, which is assigned the CVE identifier CVE-2024-6242, carries a CVSS v3.1 score of 8.4. "A vulnerability exists in the affected products that allows a threat actor to bypass the Trusted Slot feature in a ControlLogix controller," the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said in an advisory. "If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis." Operational technology security company Claroty, which discovered and reported the vulnerability, said it developed a technique that made it possible to bypass the trusted slot feature and send malicious commands to the programming logic controller (PLC) CPU. The trusted slot feature "enforces security policies and allows the controller to deny communication via untrusted paths on the local chassis," security researcher Sharon Brizinov said. "The vulnerability we found, before it was fixed, allowed an attacker to jump between local backplane slots within a 1756 chassis using CIP routing, traversing the security boundary meant to protect the CPU from untrusted cards." While a successful exploit requires network access to the device, an attacker could take advantage of the flaw to send elevated commands, including downloading arbitrary logic to the PLC CPU, even if the attacker is located behind an untrusted network card. Following responsible disclosure, the shortcoming has been addressed in the following versions - "This vulnerability had the potential to expose critical control systems to unauthorized access over the CIP protocol that originated from untrusted chassis slots," Brizinov said.

Daily Brief Summary

CYBERCRIME // Critical Security Vulnerability Found in Rockwell Automation Devices

A severe security bypass vulnerability, CVE-2024-6242, was discovered in Rockwell Automation ControlLogix 1756 devices, which allows unauthorized access and command execution.

The flaw, with a CVSS v3.1 score of 8.4, permits attackers to bypass the Trusted Slot feature of the device and execute hazardous CIP commands.

CISA issued an advisory noting that exploiting this flaw allows attackers to alter user projects and device configurations on ControlLogix controllers.

Security research company Claroty discovered the vulnerability, enabling attackers to sidestep security measures and send malicious commands directly to the PLC CPU.

The Trusted Slot feature, designed to enforce security policies and control communication, was compromised, allowing attackers to transmit commands across local backplane slots, effectively breaching the security perimeter.

Although exploiting this vulnerability requires network access to the affected device, if accessed, attackers can send high-level commands and download logic to the PLC CPU.

The vulnerability has now been patched following responsible disclosure practices; updates are available in newer versions of the software.