CVE-2021-22681
Plain English Summary
AI-powered analysis for quick understanding
An attacker can gain unauthorized access to various Rockwell Automation controllers, allowing them to manipulate or control industrial processes without needing to authenticate. This vulnerability affects specific versions of Rockwell's software and requires no prior credentials, making it particularly dangerous for organizations using these systems.
Technical Description
Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 3, 2021
about 5 years ago
Last Modified
Mar 6, 2026
about 1 month ago
Vendor
rockwellautomation
Product
factorytalk services platform
Related Vulnerabilities
An attacker can send a specially crafted web request to crash the CompactLogix 5370 controllers, making them unavailable, and potentially run malicious code on them. This vulnerability affects specific firmware versions and requires a cold restart to recover the device.
An attacker can send specially crafted email packets to a vulnerable Rockwell Automation controller, causing it to crash and enter a state where it cannot recover without a restart. This issue affects specific versions of the CompactLogix and GuardLogix controllers, so those using these devices should be aware of the risk.