CVE-2019-10954
📋 TL;DR
This vulnerability allows an attacker to send specially crafted SMTP packets to Rockwell Automation CompactLogix and Compact GuardLogix controllers, causing them to enter a major non-recoverable faulted state (MNRF) that requires physical intervention to recover. This affects industrial control systems using these controllers in versions 20-30 and earlier, potentially disrupting manufacturing and industrial processes.
💻 Affected Systems
- CompactLogix 5370 L1 Controllers
- CompactLogix 5370 L2 Controllers
- CompactLogix 5370 L3 Controllers
- Compact GuardLogix 5370 controllers
- Armor Compact GuardLogix 5370 Controllers
📦 What is this software?
Armor Compact Guardlogix 5370 Firmware by Rockwellautomation
View all CVEs affecting Armor Compact Guardlogix 5370 Firmware →
Compact Guardlogix 5370 Firmware by Rockwellautomation
Compactlogix 5370 L1 Firmware by Rockwellautomation
Compactlogix 5370 L2 Firmware by Rockwellautomation
Compactlogix 5370 L3 Firmware by Rockwellautomation
⚠️ Risk & Real-World Impact
Worst Case
Complete production shutdown requiring physical controller replacement, leading to extended downtime and significant financial losses in critical infrastructure.
Likely Case
Targeted denial-of-service attacks causing production line stoppages requiring manual controller reset or replacement.
If Mitigated
Limited impact if controllers are isolated from untrusted networks and SMTP services are disabled.
🎯 Exploit Status
Exploitation requires sending crafted SMTP packets to vulnerable controllers. No authentication needed if network access is available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 31 and later
Vendor Advisory: https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1075979
Restart Required: Yes
Instructions:
1. Download firmware version 31 or later from Rockwell Automation website. 2. Backup controller configuration. 3. Update firmware using Rockwell Automation programming software. 4. Restart controller. 5. Verify firmware version and restore configuration if needed.
🔧 Temporary Workarounds
Disable SMTP Services
allDisable SMTP email functionality on affected controllers to prevent exploitation.
Configure via Studio 5000 Logix Designer: Controller Properties > Module Info > Email Configuration > Disable SMTP
Network Segmentation
allIsolate controllers from untrusted networks using firewalls and VLANs.
Configure firewall rules to block SMTP traffic (port 25) to controllers from untrusted sources
🧯 If You Can't Patch
- Implement strict network segmentation to isolate controllers from all untrusted networks
- Deploy intrusion detection systems to monitor for SMTP-based attacks and anomalous traffic patterns
🔍 How to Verify
Check if Vulnerable:
Check controller firmware version via Studio 5000 Logix Designer: Controller Properties > Controller. If version is 20-30 or earlier, system is vulnerable.
Check Version:
In Studio 5000 Logix Designer: Right-click controller > Properties > Controller tab > check Major Revision
Verify Fix Applied:
Verify firmware version is 31 or later in Studio 5000 Logix Designer and confirm SMTP is disabled or properly configured.
📡 Detection & Monitoring
Log Indicators:
- Controller entering Major Non-Recoverable Fault (MNRF) state
- SMTP service errors or unusual SMTP traffic patterns
- Unexpected controller resets or fault conditions
Network Indicators:
- Unusual SMTP traffic to controller IP addresses
- Crafted SMTP packets targeting port 25 on controllers
- Traffic from unexpected sources to controller SMTP services
SIEM Query:
source_ip=* AND dest_port=25 AND (dest_ip=controller_ips) AND (packet_size>normal OR protocol_anomalies)
🔗 References
- http://www.securityfocus.com/bid/108118
- https://ics-cert.us-cert.gov/advisories/ICSA-19-120-01
- https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1075979
- http://www.securityfocus.com/bid/108118
- https://ics-cert.us-cert.gov/advisories/ICSA-19-120-01
- https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1075979