[Control System] Rockwell Automation Security Update
Date: 04 July 2018
The purpose of this advisory is to bring attention to vulnerabilities affecting Rockwell Automation Allen-Bradley Stratix 5950.
Rockwell Automation has released a security advisory to address vulnerabilities in products which use the Rockwell Automation Allen-Bradley Stratix 5950, including: Improper Input Validation, Improper Certificate Validation and Resource Management Errors. Successful exploitation of these vulnerabilities could allow an attacker to bypass client certification to create connections to the affected device or cause the device to crash.
Allen-Bradley Stratix 5950 Security Appliances, running the Cisco ASA v9.6.2 and earlier, are affected:
CVE References: CVE-2018-0228, CVE-2018-0227, CVE-2018-0231, CVE-2018-0240, CVE-2018-0296
CCIRC recommends that owner/operators test and deploy the vendor released updates or workarounds to affected platforms accordingly.
ICS-CERT : ICSA-18-184-01 – Rockwell Automation Allen-Bradley Stratix 5950:
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: