10.0
CRITICAL
CVE-2022-1161
Allen-Bradley ControlLogix Code Injection Vulnerability
Description

An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code, allowing an attacker to change one and not the other.

INFO

Published Date :

April 11, 2022, 8:15 p.m.

Last Modified :

April 18, 2022, 2:23 p.m.

Remotely Exploitable :

Yes !

Impact Score :

6.0

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2022-1161 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Rockwellautomation compactlogix_5380_firmware
2 Rockwellautomation controllogix_5580_firmware
3 Rockwellautomation compact_guardlogix_5380_firmware
4 Rockwellautomation compactlogix_5480_firmware
5 Rockwellautomation guardlogix_5580_firmware
6 Rockwellautomation compact_guardlogix_5370_firmware
7 Rockwellautomation controllogix_5570_firmware
8 Rockwellautomation guardlogix_5570_firmware
9 Rockwellautomation compactlogix_1768-l43_firmware
10 Rockwellautomation compactlogix_1768-l45_firmware
11 Rockwellautomation compactlogix_1769-l31_firmware
12 Rockwellautomation compactlogix_1769-l32c_firmware
13 Rockwellautomation compactlogix_1769-l32e_firmware
14 Rockwellautomation compactlogix_1769-l35cr_firmware
15 Rockwellautomation compactlogix_1769-l35e_firmware
16 Rockwellautomation compactlogix_5370_l3_firmware
17 Rockwellautomation compactlogix_5370_l2_firmware
18 Rockwellautomation compactlogix_5370_l1_firmware
19 Rockwellautomation controllogix_5550_firmware
20 Rockwellautomation controllogix_5560_firmware
21 Rockwellautomation guardlogix_5560_firmware
22 Rockwellautomation flexlogix_1794-l34_firmware
23 Rockwellautomation drivelogix_5730_firmware
24 Rockwellautomation softlogix_5800_firmware
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2022-1161.

URL Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-05 Third Party Advisory US Government Resource

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-1161 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-1161 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Apr. 18, 2022

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-05 No Types Assigned https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-05 Third Party Advisory, US Government Resource
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_1768-l43_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_1768-l43:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_1768-l45_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_1768-l45:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_1769-l31_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_1769-l31:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_1769-l32c_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_1769-l32c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_1769-l32e_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_1769-l32e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_1769-l35cr_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_1769-l35cr:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_1769-l35e_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_1769-l35e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_5370_l3_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_5370_l3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_5370_l2_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_5370_l2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_5370_l1_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_5370_l1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compact_guardlogix_5370_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compact_guardlogix_5370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:controllogix_5550_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:controllogix_5550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:controllogix_5560_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:controllogix_5560:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:controllogix_5570_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:controllogix_5570:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:controllogix_5580_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:guardlogix_5560_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:guardlogix_5560:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:guardlogix_5570_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:guardlogix_5570:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:flexlogix_1794-l34_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:flexlogix_1794-l34:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:drivelogix_5730_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:drivelogix_5730:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:rockwellautomation:softlogix_5800_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:rockwellautomation:softlogix_5800:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.16 }} 0.05%

score

0.53967

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability