New Flaws Allow Stuxnet-Style Attacks against Rockwell PLCs

New Flaws Allow Stuxnet-Style Attacks against Rockwell PLCs-01

Claroty, an industrial cybersecurity firm has discovered two serious flaws that could allow threat actors to perform Stuxnet-style attacks against Rockwell Automation programmable logic controllers (PLCs). Claroty issued a blog post on Thursday detailing its findings.

On Thursday, the US Cybersecurity and Infrastructure Security Agency (CISA) and Rockwell Automation issued separate recommendations for the two vulnerabilities. One of the security flaws, CVE-2022-1161, affects different CompactLogix, ControlLogix, GuardLogix, FlexLogix, DriveLogix, and SoftLogix controllers and is classified as “critical.”

The second vulnerability, CVE-2022-1159, affects the Studio 5000 Logix Designer programming software that runs on engineering workstations and is classified as “high severity.”

Read More: https://www.securityweek.com/new-vulnerabilities-allow-stuxnet-style-attacks-against-rockwell-plcs

For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.