The US Cybersecurity and Infrastructure Security Agency (CISA) has published three advisories regarding vulnerabilities in Rockwell Automation controllers. Rockwell has released updates to address two of the vulnerabilities: an improper access control issue in Rockwell Automation Studio 5000 Logix Emulate and an improper input validation issue in Rockwell Automation GuardLogix and ControlLogix controllers. Rockwell has suggested mitigation for an unauthenticated stored cross-site scripting vulnerability and a clickjacking vulnerability that affect Rockwell Automation MicroLogix 1100 and 1400.
Note
In addition to applying the update, double check that you’ve employed segmentation and monitoring to ensure only authorized devices and users can access these OT components, and don’t expose them directly to the Internet.
Read more in
- CVE-2022-3156: ICS Advisory (ICSA-22-356-02) Rockwell Automation Studio 5000 Logix Emulate
- CVE-2022-3157: ICS Advisory (ICSA-22-354-02) Rockwell Automation GuardLogix and ControlLogix controllers
- CVE-2022-46670 / CVE-2022-3166: ICS Advisory (ICSA-22-354-04) Rockwell Automation MicroLogix 1100 and 1400