CVE-2019-10954
Plain English Summary
AI-powered analysis for quick understanding
An attacker can send specially crafted email packets to a vulnerable Rockwell Automation controller, causing it to crash and enter a state where it cannot recover without a restart. This issue affects specific versions of the CompactLogix and GuardLogix controllers, so those using these devices should be aware of the risk.
Technical Description
An attacker could send crafted SMTP packets to cause a denial-of-service condition where the controller enters a major non-recoverable faulted state (MNRF) in CompactLogix 5370 L1, L2, and L3 Controllers, Compact GuardLogix 5370 controllers, and Armor Compact GuardLogix 5370 Controllers Versions 20 - 30 and earlier.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
May 1, 2019
almost 7 years ago
Last Modified
Feb 20, 2026
about 2 months ago
Vendor
rockwellautomation
Product
compactlogix 5370 l1 firmware
Related Vulnerabilities
An attacker can gain unauthorized access to various Rockwell Automation controllers, allowing them to manipulate or control industrial processes without needing to authenticate. This vulnerability affects specific versions of Rockwell's software and requires no prior credentials, making it particularly dangerous for organizations using these systems.
An attacker can send a specially crafted web request to crash the CompactLogix 5370 controllers, making them unavailable, and potentially run malicious code on them. This vulnerability affects specific firmware versions and requires a cold restart to recover the device.