Project Subscriptions
| Vendors | Products |
|---|---|
|
Rockwellautomation
Subscribe
|
Armor Compact Guardlogix 5370
Subscribe
Armor Compact Guardlogix 5370 Firmware
Subscribe
Compact Guardlogix 5370
Subscribe
Compact Guardlogix 5370 Firmware
Subscribe
Compactlogix 5370 L1
Subscribe
Compactlogix 5370 L1 Firmware
Subscribe
Compactlogix 5370 L2
Subscribe
Compactlogix 5370 L2 Firmware
Subscribe
Compactlogix 5370 L3
Subscribe
Compactlogix 5370 L3 Firmware
Subscribe
Controllogix 5570
Subscribe
Controllogix 5570 Firmware
Subscribe
Guardlogix 5560
Subscribe
Guardlogix 5560 Firmware
Subscribe
Guardlogix 5570
Subscribe
Guardlogix 5570 Firmware
Subscribe
Guardlogix 5580
Subscribe
Guardlogix 5580 Firmware
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-28138 | The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop. This may allow an attacker to send specially crafted CIP packet requests to a controller, which may cause denial-of-service conditions in communications with other products. |
Solution
Rockwell Automation recommends affected users apply firmware v33.011 or later. For more information see the Rockwell Automation advisory (login required).
Workaround
No workaround given by the vendor.
Thu, 17 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-17T15:51:02.651Z
Reserved: 2020-01-14T00:00:00.000Z
Link: CVE-2020-6998
Updated: 2024-08-04T09:18:02.993Z
Status : Modified
Published: 2022-07-27T21:15:08.297
Modified: 2025-04-17T16:15:21.730
Link: CVE-2020-6998
No data.
OpenCVE Enrichment
No data.
EUVD