The affected products, RSLogix 500 and RSLogix Micro, are design and configuration software used with certain Rockwell Automation products. Rockwell Automation, which is a US-based company, provides industrial automation control and information products worldwide across a wide range of industries. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation. Impact to individual organizations depends on many factors that are unique to each organization. The impact to the user’s environment is highly dependent on both the type of malicious code included in the attack and the mitigations that the user may already employ.
#Rslogix 500 pro update
End Update A Part 2 of 3 - IMPACTĪ successful attack may potentially allow malicious code to execute on the target computer at the same privilege level as the logged-in user. RSLogix 500 Professional Edition, Version 10.00.00 or prior.RSLogix 500 Standard Edition, Version 10.00.00 or prior and.RSLogix 500 Starter Edition, Version 10.00.00 or prior.RSLogix Micro Developer, Version 10.00.00 or prior.RSLogix Micro Starter Lite, Version 10.00.00 or prior.
Rockwell Automation reports that the vulnerability affects the following products:
End Update A Part 1 of 3 - AFFECTED PRODUCTS Rockwell Automation has released a new version of software, v11.00.00, which resolves the vulnerability. Rockwell Automation investigated the matter and found that it also affected RSLogix 500 and other versions of RSLogix Micro. Begin Update A Part 1 of 3 -Īriele Caltabiano (kimiya) working with Trend Micro’s Zero Day Initiative has identified a parser buffer overflow vulnerability in Rockwell Automation’s RSLogix Starter Lite. This updated advisory is a follow-up to the original advisory titled ICSA-16-224-02 Rockwell Automation RSLogix 500 and RSLogix Micro File Parser Buffer Overflow Vulnerability that was published September 15, 2016, on the NCCIC/ICS-CERT web site.