CVE-2020-6085
📋 TL;DR
CVE-2020-6085 is a denial-of-service vulnerability in Allen-Bradley Flex IO devices where a specially crafted ENIP request with a malformed Electronic Key Segment can cause the device to lose communications. This affects industrial control systems using vulnerable Flex IO 1794-AENT/B modules, potentially disrupting operations.
💻 Affected Systems
- Allen-Bradley Flex IO 1794-AENT/B
📦 What is this software?
Flex I\/o 1794 Aent by Rockwellautomation
⚠️ Risk & Real-World Impact
Worst Case
Complete loss of communications with the Flex IO device, disrupting industrial processes and causing operational downtime in critical infrastructure environments.
Likely Case
Temporary denial of service requiring device reboot to restore functionality, causing production interruptions in manufacturing or industrial settings.
If Mitigated
Minimal impact if network segmentation and access controls prevent unauthorized access to industrial control networks.
🎯 Exploit Status
Exploitation requires sending a single malformed packet to the device's EtherNet/IP port (typically TCP/44818). The vulnerability is well-documented in public advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Contact Rockwell Automation for firmware updates
Vendor Advisory: https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1127680
Restart Required: Yes
Instructions:
1. Contact Rockwell Automation for firmware updates. 2. Download appropriate firmware from Rockwell support portal. 3. Follow manufacturer's firmware update procedures for Flex IO devices. 4. Test updated firmware in non-production environment first.
🔧 Temporary Workarounds
Network Segmentation
allIsolate industrial control network from corporate network using firewalls with strict rules
Access Control Lists
allImplement ACLs to restrict access to EtherNet/IP ports (TCP/44818) to authorized devices only
🧯 If You Can't Patch
- Implement strict network segmentation to isolate industrial control systems from other networks
- Deploy intrusion detection systems monitoring for malformed ENIP packets on industrial networks
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via Rockwell Automation software or web interface. Version 4.003 is vulnerable.
Check Version:
Use Rockwell Automation's RSLinx or Studio 5000 to check firmware version of 1794-AENT/B modules
Verify Fix Applied:
Verify firmware has been updated to version newer than 4.003 through manufacturer's management tools.
📡 Detection & Monitoring
Log Indicators:
- Device communication loss logs
- Network timeout errors in SCADA/PLC logs
Network Indicators:
- Malformed ENIP packets with Electronic Key Segment < 0x18 bytes
- Traffic to TCP/44818 with abnormal packet structure
SIEM Query:
source_port=44818 AND (packet_size < threshold OR protocol_violation=ENIP)