{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T04:11:47.913","vulnerabilities":[{"cve":{"id":"CVE-2022-3752","sourceIdentifier":"PSIRT@rockwellautomation.com","published":"2022-12-19T23:15:10.660","lastModified":"2024-11-21T07:20:10.707","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic \nloading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload \nthe user project file to bring the device back online and continue normal operation.\n\n\n"},{"lang":"es","value":"Un usuario no autorizado podría utilizar una secuencia especialmente manipulada de mensajes Ethernet/IP, combinada con una gran carga de tráfico, para provocar una condición de Denegación de Servicio (DoS) en los controladores Logix de Rockwell Automation, lo que provocaría una falla importante no recuperable. Si el dispositivo de destino deja de estar disponible, el usuario tendría que borrar la falla y volver a descargar el archivo de proyecto del usuario para volver a poner el dispositivo en línea y continuar con el funcionamiento normal."}],"metrics":{"cvssMetricV31":[{"source":"PSIRT@rockwellautomation.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"PSIRT@rockwellautomation.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"32.011","matchCriteriaId":"A3BB8945-AC46-463C-A7D9-15584AD0FA68"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*","matchCriteriaId":"80F4F5BE-07DF-402A-BF98-34FBA6A11968"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:compactlogix_5580_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"31.011","matchCriteriaId":"EDD27C92-CC9B-4780-B7AC-8ECBE1FF7C77"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:compactlogix_5580:-:*:*:*:*:*:*:*","matchCriteriaId":"CEA62D6E-168F-4EEC-9E90-C679273C1CDB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"32.011","matchCriteriaId":"25846D71-4F46-4C50-BB76-5D692DE9ACFE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*","matchCriteriaId":"006B7683-9FDF-4748-BA28-2EA22613E092"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"31.011","matchCriteriaId":"E187CC9F-3BFC-4AE3-A4E5-477416A16E24"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*","matchCriteriaId":"62414E65-73C7-4172-B7BF-F40A66AFBB90"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"31.011","matchCriteriaId":"65D5D8EB-6A19-4849-988D-C3F65071B05F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*","matchCriteriaId":"EDD040ED-B44C-47D0-B4D4-729C378C4F68"}]}]}],"references":[{"url":"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137664","source":"PSIRT@rockwellautomation.com","tags":["Permissions Required","Vendor Advisory"]},{"url":"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137664","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Vendor Advisory"]}]}}]}