A serious vulnerability affecting some of Rockwell Automation’s MicroLogix and CompactLogix programmable logic controllers (PLCs) can be exploited by a remote attacker to redirect users to malicious websites.
According to advisories published by ICS-CERT and Rockwell Automation, the flaw, tracked as CVE-2019-10955 and assigned a CVSS score of 7.1 (high severity), impacts MicroLogix 1100 and 1400, and CompactLogix 5370 (L1, L2 and L3) controllers.
The issue, described by ICS-CERT as an open redirect vulnerability, is related to the web server running on these devices. This web server accepts user input from the PLCs web interface and a remote, unauthenticated attacker can inject a malicious link that redirects users from the controller’s web server to an arbitrary site.
“This malicious website could potentially run or download arbitrary malware on the user’s machine. The target of this type of attack is not the industrial control device and does not disrupt its control functionality,” Rockwell noted in its advisory (only available to registered users).
Learn More About ICS Flaws at SecurityWeek’s 2019 ICS Cyber Security Conference
The vendor has released firmware updates for the affected controllers that should patch the vulnerability. Organizations that cannot install the updates have been advised to disable the web server and implement general security measures in order to prevent potential attacks.
Researchers Josiah Bryan and Geancarlo Palavicini have been credited for reporting the vulnerability to Rockwell Automation.
Related: Severe Vulnerabilities Expose MicroLogix PLCs to Attacks
Related: Rockwell Automation Patches Serious Flaw in MicroLogix 1400 PLC
Related: Vulnerability Exposes Rockwell Controllers to DoS Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
