[Control systems] Rockwell Automation EDS Subsystem security advisory

Number: AV20-153
Date: 20 May 2020

On 19 May 2020 Rockwell Automation released security updates to address a vulnerability in the Automation EDS Subsystem, version 28.0.1 and prior, within the following products:
• FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11
• RSLinx Classic: Version 4.11.00 and prior
• RSNetWorx software: Version 28.00.00 and prior
• Studio 5000 Logix Designer software: Version 32 and prior

A memory corruption vulnerability exists in the algorithm that matches square brackets in the EDS subsystem. This may allow an attacker to craft specialized EDS files to crash the EDSParser COM object, leading to denial-of-service conditions.

The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary manufacturer updates.

ICS Advisory (ICSA-20-140-01)
https://www.us-cert.gov/ics/advisories/icsa-20-140-01


Note to Readers
The Canadian Centre for Cyber Security (Cyber Centre) operates as part of the Communications Security Establishment.  We are Canada’s national authority on cyber security and we lead the government’s response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure, Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.

Date modified: