A recent ICS advisory has highlighted a vulnerability in Rockwell Automation’s 5015-AENFTXT equipment. The vulnerability, classified as “Improper Input Validation” (CWE-20), could allow an attacker to crash the device and impact its availability. The vulnerability affects the 5015-AENFTXT ethernet/IP adapter products, specifically versions v35 and prior to v2.12.1. If exploited, the device’s availability will be impacted, requiring a manual restart. A malformed PTP packet is needed to exploit this vulnerability. The vulnerability has been assigned CVE-2024-2424, with a CVSS v3.1 base score of 7.5 and a CVSS v4 score of 8.7.
Rockwell Automation has reported this vulnerability to CISA and recommends users update to v2.12.1. For users unable to upgrade to one of the corrected versions, they are encouraged to apply Security Best Practices where possible. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as minimizing network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet, and locating control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, more secure methods, such as Virtual Private Networks (VPNs), should be used. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics.