Security Experts:

Connect with us

Hi, what are you looking for?



Rockwell Patches Stratix Switch Flaws Introduced by Cisco Software

Updates released this week by Rockwell Automation for its Allen-Bradley Stratix industrial switches patch several denial-of-service (DoS) vulnerabilities introduced by the use of Cisco software.

Updates released this week by Rockwell Automation for its Allen-Bradley Stratix industrial switches patch several denial-of-service (DoS) vulnerabilities introduced by the use of Cisco software.

Three separate advisories were published on Thursday by ICS-CERT and Rockwell Automation (only available to registered users) to describe the impact of the flaws on Stratix 5400, 5410, 5700, 8000, 8300, 5950, and ArmorStratix 5700 switches.

One advisory describes several high-severity vulnerabilities related to the Open Shortest Path First version 3 (OSPFv3), web framework, Precision Time Protocol (PTP), IPv6 processing, and Discovery Protocol components of Cisco IOS and IOS XE.

Allen-Bradley industrial switchEach of these flaws can be exploited by a remote or adjacent attacker, without authentication, to cause affected devices to reload and enter a DoS condition by sending it specially crafted packets.

A separate advisory has been published for a medium-severity flaw in the Cisco Network Plug and Play agent. This security hole can be exploited remotely without authentication to cause a device to reload by sending invalid data to the agent.

Rockwell Automation has fixed the vulnerabilities with the release of versions 15.2(6)E2a, 15.2(6)E0a, and 15.2(4)EA7. Cisco released patches for these issues in September 2018.

Learn More About ICS Flaws at SecurityWeek’s 2019 ICS Cyber Security Conference

A third advisory has been released for a high-severity vulnerability that Rockwell has yet to patch — Cisco addressed it in September 2018. This weakness can be exploited by a remote and unauthenticated attacker to cause a device to reload by sending it malicious IPsec packets.

While this is a serious vulnerability, Rockwell has pointed out that the IPsec feature is disabled by default in its Stratix 5950 security appliance, which is affected by the flaw. The company has advised customers to avoid using any IPsec VPN connections to prevent potential attacks.

Related: Rockwell Automation Switches Exposed to Attacks by Cisco IOS Flaws

Related: Cisco IOS Flaws Expose Rockwell Industrial Switches to Remote Attacks

Related: Rockwell Updates Stratix Routers to Patch Cisco IOS Flaws

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...