Vulnerabilities > Rockwellautomation > Compactlogix 5370 L1 Firmware

DATE CVE VULNERABILITY TITLE RISK
2022-07-27 CVE-2020-6998 Improper Input Validation vulnerability in Rockwellautomation products
The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop.
network
low complexity
rockwellautomation CWE-20
8.6
2022-04-11 CVE-2022-1161 Unspecified vulnerability in Rockwellautomation products
An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems.
network
low complexity
rockwellautomation
critical
9.8
2019-05-01 CVE-2019-10952 Unspecified vulnerability in Rockwellautomation products
An attacker could send a crafted HTTP/HTTPS request to render the web server unavailable and/or lead to remote code execution caused by a stack-based buffer overflow vulnerability.
network
low complexity
rockwellautomation
critical
9.8
2019-05-01 CVE-2019-10954 Unspecified vulnerability in Rockwellautomation products
An attacker could send crafted SMTP packets to cause a denial-of-service condition where the controller enters a major non-recoverable faulted state (MNRF) in CompactLogix 5370 L1, L2, and L3 Controllers, Compact GuardLogix 5370 controllers, and Armor Compact GuardLogix 5370 Controllers Versions 20 - 30 and earlier.
network
low complexity
rockwellautomation
7.5
2019-04-25 CVE-2019-10955 Open Redirect vulnerability in Rockwellautomation products
In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earlier, MicroLogix 1100 Controllers v14.00 and earlier, CompactLogix 5370 L1 controllers v30.014 and earlier, CompactLogix 5370 L2 controllers v30.014 and earlier, CompactLogix 5370 L3 controllers (includes CompactLogix GuardLogix controllers) v30.014 and earlier, an open redirect vulnerability could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site that could run or download arbitrary malware on the user’s machine.
network
low complexity
rockwellautomation CWE-601
6.1