Vulnerability Management, Patch/Configuration Management

Security bypass possible with now-addressed Rockwell Logix PLC flaw

Share

Threat actors could exploit an already addressed high-severity vulnerability affecting some Rockwell Automation Logix programmable logic controllers, tracked as CVE-2024-6242, to evade the controllers' Trusted Slot functionality, SecurityWeek reports.

Intrusions leveraging the flaw against impacted modules on the 1756 chassis containing the devices' communication processors, controllers, and I/O modules could result in the execution of common industrial protocol commands enabling the alteration of controller user projects and/or device configurations, a report from Claroty revealed. "We found a vulnerability that allowed an attacker to bypass the trusted slot feature, jumping between local backplane slots within a 1756 chassis using CIP routing, traversing the security boundary meant to protect the CPU from untrusted cards. An attacker with this kind of access would be able to send elevated commands such as downloading logic to the PLC CPU even if the attacker is located behind an untrusted network card," said Claroty.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.