Description Preview
Rockwell Automation Studio 5000 Logix Designer (all versions) can be exploited by an attacker who obtains administrator access on a workstation running the application to inject controller code that is undetectable by the user. This flaw arises from improper control of generation of code (code injection) within the affected product. The impact is significant across confidentiality, integrity, and availability, as the attacker can alter controller logic in a way that is not readily detected by users. Exploitation requires local access, elevated privileges, and user interaction, and the attack can affect the controller and related components, leading to a changed security scope. There is no direct runtime mitigation within the Logix Designer application itself; however, detection methods exist to verify that the controller’s current program matches what was downloaded, and Rockwell provides guidance to mitigate risk through upgraded software and verification tooling. The recommended mitigations include upgrading to Studio 5000 v34 or later and applying corresponding controller firmware, and leveraging user program verification via the Logix Designer Compare Tool v9+ or FactoryTalk AssetCentre v12+ to detect mismatches, with verification performed on an uncompromised workstation.
Overview
Rockwell Automation Studio 5000 Logix Designer is susceptible to a local, high-privilege code injection vulnerability that allows an administrator on a workstation to inject controller code in a way that is difficult for users to detect. The issue affects all versions and carries a high impact across confidentiality, integrity, and availability, requiring user interaction and local access to exploit. The vendor indicates there is no direct in-app mitigation, but provides detection and upgrade-based strategies to reduce risk, including software and firmware updates and verification tools to ensure the controller program matches the downloaded version.
Remediation
- Upgrade to Studio 5000 software version 34 or later, and apply the corresponding firmware for Logix 5580, 5380, 5480, GuardLogix 5580, and Compact GuardLogix 5380 controllers as recommended by Rockwell Automation.
- Use the detection options described by Rockwell to verify that the controller program residing in the controller matches what was downloaded:
- On-demand verification with the Logix Designer application Compare Tool v9 or later.
- Scheduled verification with FactoryTalk AssetCentre v12 or later (available Fall 2022).
- Perform user program verification on an uncompromised workstation to reduce risk of manipulated tooling or software on that device.
- Implement defense-in-depth practices: restrict administrator access on engineering workstations, monitor for tampering, and apply general security hardening as per organizational practices.
References
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing: Medium
- Health Care & Social AssistanceHealth Care & Social Assistance: Low
- Public AdministrationPublic Administration: Low
- Retail TradeRetail Trade: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- UtilitiesUtilities: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- InformationInformation: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- MiningMining: Low
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- ConstructionConstruction: Low
- Educational ServicesEducational Services: Low
- Finance and InsuranceFinance and Insurance: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- Wholesale TradeWholesale Trade: Low