CVE-2024-6207

EUVD-2024-47344
CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and send a specially crafted CIP message to the device.  If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation.  To recover the controllers, a download is required which ends any process that the controller is running.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 56%
Affected Products (NVD)
VendorProductVersion
rockwellautomationcontrollogix_5580_firmware
28.011 ≤
𝑥
< 33.017
rockwellautomationcontrollogix_5580_firmware
34.011 ≤
𝑥
< 34.014
rockwellautomationcontrollogix_5580_firmware
35.011 ≤
𝑥
< 35.013
rockwellautomationcontrollogix_5580_process_firmware
33.011 ≤
𝑥
< 33.017
rockwellautomationcontrollogix_5580_process_firmware
34.011 ≤
𝑥
< 34.014
rockwellautomationcontrollogix_5580_process_firmware
35.011 ≤
𝑥
< 35.013
rockwellautomationguardlogix_5580_firmware
31.011 ≤
𝑥
< 33.017
rockwellautomationguardlogix_5580_firmware
34.011 ≤
𝑥
< 34.014
rockwellautomationguardlogix_5580_firmware
35.011 ≤
𝑥
< 35.013
rockwellautomationcompactlogix_5380_firmware
28.011 ≤
𝑥
< 33.017
rockwellautomationcompactlogix_5380_firmware
34.011 ≤
𝑥
< 34.014
rockwellautomationcompactlogix_5380_firmware
35.011 ≤
𝑥
< 35.013
rockwellautomationcompact_guardlogix_5380_sil_2_firmware
31.011 ≤
𝑥
< 33.017
rockwellautomationcompact_guardlogix_5380_sil_2_firmware
34.011 ≤
𝑥
< 34.014
rockwellautomationcompact_guardlogix_5380_sil_2_firmware
35.011 ≤
𝑥
< 35.013
rockwellautomationcompact_guardlogix_5380_sil_3_firmware
32.013 ≤
𝑥
< 33.017
rockwellautomationcompact_guardlogix_5380_sil_3_firmware
34.011 ≤
𝑥
< 34.014
rockwellautomationcompact_guardlogix_5380_sil_3_firmware
35.011 ≤
𝑥
< 35.013
rockwellautomationcompactlogix_5480_firmware
32.011 ≤
𝑥
< 33.017
rockwellautomationcompactlogix_5480_firmware
34.011 ≤
𝑥
< 34.014
rockwellautomationcompactlogix_5480_firmware
35.011 ≤
𝑥
< 35.013
rockwellautomationfactorytalk_logix_echo_firmware
33.011 ≤
𝑥
< 34.014
rockwellautomationfactorytalk_logix_echo_firmware
35.011 ≤
𝑥
< 35.013
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
rockwellautomationcompactlogix_5380_firmware
28.011 ≤
𝑥
< 33.017
ADP
rockwellautomationcompactlogix_5380_firmware
34.0 ≤
𝑥
< 34.014
ADP
rockwellautomationcompactlogix_5380_firmware
35.0 ≤
𝑥
< 35.013
ADP
rockwellautomationcompactlogix_5380_firmware
36.0 ≤
𝑥
< 36.011
ADP
rockwellautomationcontrollogix_5580_process_firmware
33.011 ≤
𝑥
< 33.017
ADP
rockwellautomationcontrollogix_5580_process_firmware
34.0 ≤
𝑥
< 34.014
ADP
rockwellautomationcontrollogix_5580_process_firmware
35.0 ≤
𝑥
< 35.013
ADP
rockwellautomationcontrollogix_5580_process_firmware
36.0 ≤
𝑥
< 36.011
ADP
rockwellautomationguardlogix_5580_firmware
31.011 ≤
𝑥
< 33.017
ADP
rockwellautomationguardlogix_5580_firmware
34.0 ≤
𝑥
< 34.014
ADP
rockwellautomationguardlogix_5580_firmware
35.0 ≤
𝑥
< 35.013
ADP
rockwellautomationguardlogix_5580_firmware
36.0 ≤
𝑥
< 36.011
ADP
rockwellautomationcontrollogix_5580_process_firmware
32.011 ≤
𝑥
< 33.017
ADP
rockwellautomationcontrollogix_5580_process_firmware
34.0 ≤
𝑥
< 34.014
ADP
rockwellautomationcontrollogix_5580_process_firmware
35.0 ≤
𝑥
< 35.013
ADP
rockwellautomationcontrollogix_5580_process_firmware
36.0 ≤
𝑥
< 36.011
ADP
rockwellautomationcompact_guardlogix_5380_sil3_firmware
32.013 ≤
𝑥
< 33.017
ADP
rockwellautomationcompact_guardlogix_5380_sil3_firmware
34.0 ≤
𝑥
< 34.014
ADP
rockwellautomationcompact_guardlogix_5380_sil3_firmware
35.0 ≤
𝑥
< 35.013
ADP
rockwellautomationcompact_guardlogix_5380_sil3_firmware
36.0 ≤
𝑥
< 36.011
ADP
rockwellautomationfactorytalk_logix_echo
33.011 ≤
𝑥
< 34.014
ADP
rockwellautomationfactorytalk_logix_echo
35.0 ≤
𝑥
< 35.013
ADP
rockwellautomationfactorytalk_logix_echo
36.0 ≤
𝑥
< 36.011
ADP