Guest

Cisco Security

Cisco Security

Rockwell ControlLogix Stop CPU

 
Signature ID: 1655/0
Original Release:S712
Release:S751 (download)
Original Release Date:2013 April 29
Latest Release Date:2013 October 30
Default Enabled:False
Default Retired:True
CVE:CVE-2012-6435
Alarm Severity:Medium
Fidelity:75 

Description

This signature mitigates a vulnerability by design in the Ethernet/IP protocol implementation of the Rockwell ControlLogix industrial controller. A description of the vulnerability is found at:http://www.us-cert.gov/control_systems/pdf/ICS-Alert-12-020-02A.pdfClass 0x64 in ControlLogix supports the stop service, i.e., service code 0x07. Invocation of that service stops the CPU and thus takes it to an idle state, which prevents subsequent requests from being processed. The fault may be cleared manually by turning the regular key on the device from RUN to PROG twice.You are entitled to use this signature only if you have purchased an IPS SCADA Signature License.

Recommended Filter

There are no suggested filters.

Benign Triggers

There are no known benign triggers.

IntelliShield Alerts

IntelliShield ID Headline VersionCVSS ScoreLast Published
27863Rockwell Automation ControlLogix Product Stop Denial of Service Vulnerability17.8/6.12013 January 14 18:17 GMT

Download

To download this and other IPS update files, please go to Cisco Secure Software Download.

LEGAL DISCLAIMER
THE INFORMATION ON THIS PAGE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION CONTAINED HEREIN, OR MATERIALS LINKED FROM THE DOCUMENT, IS AT YOUR OWN RISK. INFORMATION IN THIS DOCUMENT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
Powered by  IntelliShield