Yea not visiting a link of a 1 count poster who joined the day before..
His link is valid, don't be a smart aleck.
These two vulnerabilities have the potential to be Stuxnet-like attacks, so they are serious and have a big implication, one is rated at 10.
They affected the bread and butter product lines of Rockwell including the control/CompactLogix, as well as the GuardLogix.
From what I can gather, the remote exploit is based on the fact that bytecode/compiled code and user source code are stored in different locations and there is no live check mechanism to detect the difference.
The chart that Rockwell showed most ladder diagram logic are not affected, but then when I looked at the AOI column, they are all affected, nowadays, most programs have many AOIs.
Rockwell suggests recompiling and downloading, perhaps daily? How practical is that? I imagine during the night, an attacker can change the speed of the press and ram the **** out of it. What good is downloading & recompiling it in the morning?