CVE-2024-3493

8.6 HIGH

📋 TL;DR

A malformed fragmented packet can cause a major nonrecoverable fault in Rockwell Automation industrial controllers, rendering them unavailable and requiring manual restart. This affects ControlLogix 5580, GuardLogix 5580, CompactLogix 5380, and 1756-EN4TR devices, potentially causing loss of view and control over connected industrial equipment.

💻 Affected Systems

Products:
  • ControlLogix 5580
  • GuardLogix 5580
  • CompactLogix 5380
  • 1756-EN4TR
Versions: All versions prior to firmware updates addressing CVE-2024-3493
Operating Systems: Embedded controller firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices when processing fragmented packets, which can occur during normal large data transfers in industrial networks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of control over industrial processes, production downtime, safety system disruption, and potential physical damage to equipment.

🟠

Likely Case

Controller becomes unresponsive, requiring manual restart and causing temporary production interruption.

🟢

If Mitigated

Isolated controller failure with redundant systems maintaining operations while affected unit is restarted.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed fragmented packets to the controller's network interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Rockwell Automation advisory SD1666 for specific firmware versions

Vendor Advisory: https://www.rockwellautomation.com/en-us/support/advisory.SD1666.html

Restart Required: Yes

Instructions:

1. Review Rockwell Automation advisory SD1666
2. Download appropriate firmware update from Rockwell support site
3. Schedule maintenance window for controller update
4. Backup controller configuration
5. Apply firmware update following Rockwell documentation
6. Restart controller
7. Verify proper operation

🔧 Temporary Workarounds

Network Segmentation

all

Isolate controllers from untrusted networks and implement strict firewall rules

Traffic Filtering

all

Configure network devices to drop or inspect fragmented packets

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate controllers from potential attack sources
  • Deploy industrial intrusion detection systems to monitor for malformed packet patterns

🔍 How to Verify

Check if Vulnerable:

Check controller firmware version against patched versions listed in Rockwell advisory SD1666

Check Version:

Use Rockwell Automation programming software (Studio 5000 Logix Designer) to read controller properties and firmware version

Verify Fix Applied:

Verify firmware version has been updated to patched version and controller remains operational during normal fragmented packet traffic

📡 Detection & Monitoring

Log Indicators:

  • Controller fault logs showing major nonrecoverable faults
  • Network device logs showing malformed packet drops

Network Indicators:

  • Unusual fragmented packet patterns directed at controller IPs
  • Sudden loss of controller network communication

SIEM Query:

source="industrial_controller" AND (event_type="major_fault" OR event_type="mnrf")

🔗 References

📤 Share & Export