Loading

PN1550 | CVE-2021-22681: Authentication Bypass Vulnerability Found in Logix Controllers

Severity:
Critical
Advisory ID:
PN1550
Published Date:
July 20, 2022
Last Updated:
March 10, 2026
Revision Number:
1.6
Known Exploited Vulnerability (KEV):
Yes
Corrected:
No
Workaround:
Yes
CVE IDs
CVE-2021-22681
Downloads
The following link(s) provide the security advisory in Vulnerability Exploitability Exchange format:
JSON
Summary
CVE-2021-22681: Authentication Bypass Vulnerability Found in Logix Controllers

Revision Number

1.6

 
Revision History
Version 1.0 - February 25, 2021. Initial Release.
Version 1.2 - March 5, 2021. Updated for clarity.
Version 1.3 - May 5, 2021. Mitigations updated – 1783-CSP CIP Security Proxy.
Version 1.4 - July 20, 2022. Rearranged placement of general mitigations.
Version 1.5 – March 5, 2026. Added KEV designation.
Version 1.6 - March 10, 2026. Improved explanation of issues and remediations.

 

Executive Summary

Researchers found that Rockwell Automation Studio 5000 Logix Designer® software may allow a cryptographic key to be discovered. This internal licensing key is used by Rockwell Automation design software to communicate with Logix controllers. If successfully exploited, this vulnerability could allow a non-Rockwell Automation application to connect with Logix controllers. To leverage this vulnerability, an unauthorized user would require network access to the controller. 


FactoryTalk® Security, part of the FactoryTalk® Services Platform, provides user authentication and authorization for a particular set of actions within RSLogix 5000® and Studio 5000 Logix Designer®.  For customers who have deployed FactoryTalk® Security, this vulnerability may allow an attacker to bypass the protections provided between Rockwell Automation software and the controller. CIP Security reduces the likelihood that this vulnerability could be used to circumvent role‑based access controls.


This vulnerability was independently co-discovered by Lab of Information Systems Security Assurance (Eunseon Jeong, Youngho An, Junyoung Park, Insu Oh, Kangbin Yim) of Soonchunhyang University, Kaspersky, and by Claroty, a cybersecurity technology vendor and partner of Rockwell Automation.

Affected Products

Software:

RSLogix 5000® software v16-20, Studio 5000 Logix Designer® v21 and later, and corresponding Logix controllers running these versions.

FactoryTalk® Security, part of the FactoryTalk® Services Platform, if configured and deployed v2.10 and later.

Controllers:
1768 CompactLogix® 
1769 CompactLogix® 
CompactLogix® 5370 
CompactLogix® 5380 
CompactLogix® 5480 
ControlLogix® 5550 
ControlLogix® 5560 
ControlLogix® 5570 
ControlLogix® 5580 
ControlLogix® 5590 
DriveLogix™ 5730 
FlexLogix™ 1794-L34 
Compact GuardLogix® 5370 
Compact GuardLogix® 5380 
GuardLogix® 5560 
GuardLogix® 5570 
GuardLogix® 5580 
SoftLogix™ 5800

Vulnerability Details

CVE-2021-22681: Private Key Extraction

Studio 5000 Logix Designer® uses a key to verify Logix controllers are communicating with Rockwell Automation products. If successfully exploited, this vulnerability could allow a remote, unauthenticated attacker to bypass a verification mechanism and authenticate with Logix controllers. If exploited, this vulnerability could enable an unauthorized third-party tool to make changes to the controller configuration and/or application code.

CVSS v3.1 Base Score: 10.0/CRITICAL
CVSS Vector: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

 

Risk Mitigation & User Action

When properly deployed, CIP Security remediates this vulnerability. FactoryTalk® Policy Manager can be used to deploy a CIP Security policy that requires connections to the controller to be authenticated using strong cryptographic protections.  For more information on deploying CIP Security to protect against this vulnerability, see

https://www.rockwellautomation.com/en-us/capabilities/industrial-cybersecurity/ot-practices/cip-security.html

FactoryTalk® Security allows a controller to be bound to a security authority which manages configuration of role-based access control. If FactoryTalk® Security and CIP Security are both configured, binding a controller to a FactoryTalk® Security Authority significantly reduces the likelihood that this vulnerability could be used to circumvent role‑based access controls.

 

If it is not feasible in your environment to deploy CIP Security to protect the connection between programming workstations and controllers, other mitigations and detection strategies can be applied. For details of all mitigation options, please see the table below.

Product Family and Version

Risk Mitigation and Recommended User Actions

ControlLogix® 5590 v38 or later.

  • Put the controller mode switch to “Run” mode.

If the above cannot be deployed, the followings mitigations are recommended:

  • Deploy CIP Security for Logix Designer application connections through the front port. CIP Security prevents unauthorized connections when deployed properly.
  • If not using the front port, use a 1756-EN4TR ControlLogix® EtherNet/IP™ module and deploy CIP Security. The 1756-EN4TR supports CIP Security, which prevents unauthorized connections when properly deployed.







ControlLogix® 5580 v32 or later.

  • Put the controller mode switch to “Run” mode.

If the above cannot be deployed, the followings mitigations are recommended:

  • Deploy CIP Security for Logix Designer application connections through the front port. CIP Security prevents unauthorized connections when deployed properly.
  • If not using the front port, use a 1756-EN4TR ControlLogix® EtherNet/IP™ module and deploy CIP Security. The 1756-EN4TR supports CIP Security, which prevents unauthorized connections when properly deployed.




ControlLogix® 5580 v31

  • Put the controller mode switch to “Run” mode.

If the above cannot be deployed, the following mitigations are recommended:

  • Apply v32 or later and follow mitigations actions outlined above.
  • If unable to apply a newer version, use a 1756-EN4TR ControlLogix® EtherNet/IP module and deploy CIP Security. The 1756-EN4TR supports CIP Security, which helps prevent unauthorized connections when properly deployed.

ControlLogix® 5570 v31 or later.

  • Put the controller mode switch to “Run” mode.

If the above cannot be deployed, the following mitigations are recommended:

  • Use a 1756-EN4TR ControlLogix® EtherNet/IP Module and deploy CIP Security. The 1756-EN4TR supports CIP Security, which helps prevent unauthorized connections when properly deployed.

CompactLogix® 5380 v28 or later.

  • Put the controller mode switch to “Run” mode.

If the above cannot be deployed, the following mitigations are
recommended:

  • Install the 1783-CSP CIP Security Proxy to provide secure connection between the engineering workstation and the controller. For more information, please see the 1783-CSP CIP Proxy User Manual (link).

CompactLogix® 5370 v20 or later

  • Put the controller mode switch to “Run” mode.

If the above cannot be deployed, the following mitigations are
recommended:

  • Install the 1783-CSP CIP Security Proxy to provide secure connection between the engineering workstation and the controller. For more information, please see the 1783-CSP CIP Proxy User Manual (link).

ControlLogix® 5580 v28-v30
ControlLogix® 5570 v18 or later
ControlLogix® 5560 v16 or later
ControlLogix® 5550 v16
GuardLogix® 5580 v31 or later
GuardLogix® 5570 v20 or later
GuardLogix® 5560 v16 or later
1768 CompactLogix® v16 or later
1769 CompactLogix® v16 or later
CompactLogix® 5480 v32 or later
Compact GuardLogix® 5370 v28 or later
Compact GuardLogix® 5380 v31 or later
FlexLogix™ 1794-L34 v16
DriveLogix™ 5370 v16 or later

  • Put the controller mode switch to “Run” mode.

SoftLogix™ 5800

  • No additional mitigation available. Follow the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide.
Detection Strategies:
In addition, customers can continue to use the methods below to detect changes to configuration or application files:
  • Monitor controller change log for any unexpected modifications or anomalous activity.
  • If using v17 or later, utilize the Controller Log feature.
  • If using v20 or later, utilize Change Detection in the Logix Designer Application.
  • If using ControlLogix® 5580 or GuardLogix® 5580 firmware revision 34.011 or later, or ControlLogix® 5590 firmware revision 38.011 or later, configure Syslog to report unexpected modifications or anomalous activity to a Syslog collector.
  • If available, use the functionality in FactoryTalk® AssetCentre software to detect changes.
General Security Guidelines
Network-based Vulnerability Mitigations for Embedded Products
  • Consult the product documentation for specific features, such as a hardware Mode Switch setting, which may be used to block unauthorized changes, etc.
Social Engineering Mitigation Strategies
  • Do not click on or open URL links from untrusted sources.
  • Employ training and awareness programs to educate users on the warning signs of a phishing or social engineering attack.
General Mitigations

Customers using the affected products are directed towards risk mitigation and are encouraged, when possible, to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy.

Rockwell Automation has determined that this vulnerability cannot be mitigated with a patch. Rockwell Automation encourages customers to implement the mitigation strategies outlined in this disclosure.

A comprehensive defense-in-depth strategy can reduce the risk of this vulnerability. To leverage this vulnerability, an unauthorized user requires network access to the controller. Customers should confirm that they are employing proper networking segmentation and security controls.  Including, but not limited to:
  • Use trusted software, software patches, antivirus/antimalware programs and interact only with trusted web sites and attachments.
  • Minimizing network exposure for all control system devices and/or systems and confirm that they are not accessible from the Internet.
  • Locating control system networks and devices behind firewalls and isolating them from the enterprise/business network.
  • Restricting or blocking traffic on TCP 44818 from outside of the industrial control system network zone. For more information on the TCP/UDP ports used by Rockwell Automation products, see BF7490 - TCP/UDP Ports Used by Rockwell Automation Products.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. VPN is only as secure as the connected devices.

Customers can refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide (Publication ENET-TD001E) for best practices for deploying network segmentation and broader defense in depth strategies. Customers can also refer to the Rockwell Automation System Security Design Guidelines (Publication secure-rm001) on how to use Rockwell Automation products to improve the security of their industrial automation systems.

CIP Security mitigates this vulnerability as it provides the ability to deploy TLS and DTLS based secure communications to supported products.  CIP Security is an enhancement to the ODVA EtherNet/IP industrial communication standard and directly addresses the vulnerability noted in this disclosure. CIP Security allows for users to leverage and manage certificates and/or pre-shared keys and does not make use of any hardcoded keys.

As of May 5, 2021, a new mitigation option is now available.  The 1783-CSP CIP Security Proxy is a standalone hardware solution that provides CIP Security for devices that do not natively support CIP Security.  See below for how this product can be deployed to address CompactLogix® based applications.

Customers requiring setup or deployment guidance for CIP Security protocol should refer to the CIP Security deployment refence guide (Publication secure-at001) for more information.

*Refer to our Industrial Network Architectures Page for comprehensive information about implementing validated architectures designed to complement security solutions.

See the Network Services Overview Page for information on network and security services for Rockwell Automation to enable assessment, design, implementation and management of validated, secure network architectures.

We also recommend that concerned customers continue to monitor this advisory by subscribing to PSA/PN/Security Notifications. This can be done by updating settings in Account Overview within the Knowledgebase.

Rockwell Automation remains committed to making security enhancements to our systems in the future. For more information and for assistance with assessing the state of security of your existing control system, including improving your system-level security when using Rockwell Automation and other vendor controls products, you can visit the Rockwell Automation Security Solutions web site.

Requests for additional information can be sent to the RASecure Inbox (rasecure@ra.rockwell.com).

ADDITIONAL LINKS

  • PN1354 - Industrial Security Advisory Index
  • Industrial Firewalls within a CPwE Architecture
  • Deploying Industrial Firewalls within a CPwE Architecture Design and Implementation Guide
  • ICSA-21-056-03
Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Rockwell Automation Home
  2. Chevron LeftChevron Left Trust Center
  3. Chevron LeftChevron Left Industrial Security Adv
  4. Chevron LeftChevron Left Industrial Security Advisory Detail
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our {0} Privacy Policy
CloseClose