Rockwell Vulnerability

Yea not visiting a link of a 1 count poster who joined the day before..

His link is valid, don't be a smart aleck.

These two vulnerabilities have the potential to be Stuxnet-like attacks, so they are serious and have a big implication, one is rated at 10.
They affected the bread and butter product lines of Rockwell including the control/CompactLogix, as well as the GuardLogix.

From what I can gather, the remote exploit is based on the fact that bytecode/compiled code and user source code are stored in different locations and there is no live check mechanism to detect the difference.

The chart that Rockwell showed most ladder diagram logic are not affected, but then when I looked at the AOI column, they are all affected, nowadays, most programs have many AOIs.

Rockwell suggests recompiling and downloading, perhaps daily? How practical is that? I imagine during the night, an attacker can change the speed of the press and ram the **** out of it. What good is downloading & recompiling it in the morning?
 

Similar Topics

I saw a post over on IA; https://forum.inductiveautomation.com/t/new-rockwell-security-vulnerability-a-solid-10-out-of-10/43904 Didn't see one...
Replies
13
Views
3,254
https://www.securityweek.com/vulnerability-exposes-rockwell-controllers-dos-attacks Am I missing something, this seems like a fairly trivial...
Replies
9
Views
2,858
FYI, I received an email a few days ago about RA vulnerability with communication modules denial-of-service as well as ML1400 vulnerability. Most...
Replies
6
Views
2,202
I have got an Rockwell PLC 1769-L36ERMS . I have assigned a IP address to it . But every-time I Reboot the PLC it looses Communication to my PC...
Replies
1
Views
58
Hi all. I have 1793-IE4 (4)analog inputs modules in a 1794-ADN IOFlex DeviceNet Rack. I cannot find if I can I have access to individual channel...
Replies
1
Views
31
Back
Top Bottom