CVE-2020-6086

7.5 HIGH

📋 TL;DR

CVE-2020-6086 is a denial-of-service vulnerability in Allen-Bradley Flex IO 1794-AENT/B devices where a specially crafted ENIP request causes the device to enter a fault state, requiring physical power cycling to restore communications. This affects industrial control systems using these specific devices. Attackers can exploit this remotely via network packets.

💻 Affected Systems

Products:
  • Allen-Bradley Flex IO 1794-AENT/B
Versions: All versions prior to patched firmware
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using EtherNet/IP protocol; vulnerability is in the ENIP Request Path Data Segment parsing.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of communication with critical industrial control devices requiring physical intervention to restore functionality, potentially disrupting operations.

🟠

Likely Case

Targeted denial-of-service attacks against specific industrial devices causing temporary operational disruption.

🟢

If Mitigated

Minimal impact if devices are properly segmented and protected from untrusted networks.

🌐 Internet-Facing: HIGH if devices are directly exposed to internet without proper segmentation.
🏢 Internal Only: MEDIUM as attackers could still exploit from within the network perimeter.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a single malformed packet; proof-of-concept code is publicly available in vulnerability reports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Rockwell Automation security advisory for specific firmware versions

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory-summary.html

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download updated firmware from Rockwell Automation. 3. Apply firmware update following vendor instructions. 4. Verify update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks using firewalls and VLANs

Access Control Lists

all

Restrict network access to only trusted IP addresses that need to communicate with devices

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate devices from untrusted traffic
  • Deploy intrusion detection systems to monitor for malformed ENIP packets

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Rockwell Automation security advisory; devices with unpatched firmware are vulnerable

Check Version:

Check device firmware via Rockwell Automation programming software or web interface

Verify Fix Applied:

Verify firmware version matches patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Device fault state logs
  • Communication loss alerts
  • Power cycle events

Network Indicators:

  • Malformed ENIP packets with Simple Segment Sub-Type followed by oversized Data Size value
  • Unexpected traffic to TCP/44818

SIEM Query:

Search for network traffic to port 44818 with payload patterns matching ENIP Simple Segment exploitation

🔗 References

📤 Share & Export