Loading
myRockwellAutomation
Careers
Investors
PartnerNetwork Portal
Contact Us
Popular Resources
Compatibility & Downloads (PCDC) Knowledgebase Literature Library Lifecycle Status Learning+ Training Portal
 
Product Management
Asset Management (RAAMP) Installed Base Evaluation (IBE) My Equipment Self-Service Product Registration Repairs Service Contracts & Tickets Software Activation Software Subscriptions Sustainability Dashboard
 
Product Configuration and Selection
Advisor Bill of Materials CrossWorks Integrated Architecture Builder Product Catalog ProposalWorks Proposal Builder ProposalWorks Standards Builder Safety Automation Builder
 

 

View All Tools →

InformationInformation
This content is not available in your selected language.
Rockwell Automation logo
Products
Hardware
What's New in Hardware
Circuit & Load Protection Condition Monitoring Connection Devices Distributed Control Systems Drives Energy Monitoring Human Machine Interface (HMI) Independent Cart Technology Industrial Computers & Monitors Industrial Control Products Input/Output Modules Lighting Control
Motion Control Motor Control Network Security & Infrastructure Packaged Solutions Power Supplies Programmable Controllers Push Buttons & Signaling Devices Relays & Timers Safety Instrumented Systems Safety Products Sensors & Switches Signal Interface
Software
What's New in Software
Cloud Software
 
Design
Studio 5000 FactoryTalk Logix Echo Emulate3D Digital Twin Arena Simulation FactoryTalk Design Studio FactoryTalk Twin Studio FactoryTalk Vault
 
Analytics & Data
FactoryTalk Historian FactoryTalk Analytics FactoryTalk Analytics LogixAI FactoryTalk DataMosaix FactoryTalk Energy Manager Thingworx IIoT FactoryTalk Transaction Manager FactoryTalk Edge Manager Model Predictive Control
HMI
FactoryTalk View FactoryTalk Optix
 
MES
Plex MES FactoryTalk ProductionCentre FactoryTalk PharmaSuite Plex MES for Food & Beverage FactoryTalk CPGSuite Plex Quality Management System Plex Enterprise Resource Planning Plex Asset Performance Management Plex Production Monitoring Finite Scheduler FactoryTalk EIHub
 
Performance Monitoring
FactoryTalk Metrics OEE
 
Thin Client Management
ThinManager
Maintenance
Fiix CMMS FactoryTalk Analytics GuardianAI FactoryTalk AssetCentre FactoryTalk Remote Access FactoryTalk Network Manager Emonitor
 
Process
PlantPAx FactoryTalk Batch
 
Industrial Communications
FactoryTalk Linx
 
XR/Augmented Reality
Vuforia
Product Directory Allen-Bradley FactoryTalk
Services
Asset Optimization & Workforce Services
Asset Optimization Services Overview Equipment Repair Equipment Remanufacturing Repair and Inventory Agreements Integrated Service Agreements Remote Support & Monitoring Onsite & Field Services Safety Services Training Services
Cybersecurity & Network Infrastructure
Cybersecurity Industrial Network Infrastructure Pre-Engineered Network Solutions
Digital Thread
Overview
Production Automation
Overview Coordinated Drive System Solutions
Loading
LifecycleIQ Services
Solutions & Industries
Solutions
Advanced Motion & Robotics Asset Management Cybersecurity Data Operations & Analytics Digital Thread Digital Transformation Industrial Automation Control Industrial Components Networks & Infrastructure On-Machine Solutions
Packaged Solutions Process Solutions Production Automation Production Operations Management Safety Solutions  Scalable Control & Visualization Smart Manufacturing Sustainable Solutions Workforce Enablement
 
Solutions for
OEMs
Industries
Automotive & Tire Cement Chemical Entertainment Fiber & Textiles Food & Beverage Household & Personal Care Hydrogen Infrastructure Life Sciences
Marine Metals Mining Oil & Gas Power Generation Print & Publishing Pulp & Paper Semiconductor Warehouse & Fulfillment Water Wastewater
Loading
View Case Studies
Support
Documentation
Technical Documentation Center Product Drawings & Wiring Diagrams Product Certifications Release Notes Technical Specifications
Product Support
Downloads Selection & Configuration Management
Training
Webinars Workforce Development Training Instructor-led Courses Certificate Programs Job Aids Training Workstations Learning+ Training Subscriptions
Contact Us
TechConnect Support Customer Care Software Portal Help General Inquiries
TechConnect Support
TechConnect Support

Get the knowledge and assistance for solving your technical challenges.

Learn More about TechConnect
Compatibility and Downloads (PCDC) Knowledgebase Literature Library Engage Online Community
Sales & Partners
Find a Partner
Go to the Partner Finder
 
Our PartnerNetwork
PartnerNetwork Program Digital Partners Distributor Partners Licensed Developers
Original Equipment Manufacturer (OEM) Partners Strategic Alliance Partners System Integrator Partners Technology Partners
Order Online
Software Subscriptions E-learning Training Instructor-led Training Learning+ Training Subscriptions
What is the PartnerNetwork™?
What is the PartnerNetwork™?

Our Rockwell Automation PartnerNetwork™ program gives our customers access to the best people, products, services and solutions to meet manufacturing goals and bring The Connected Enterprise to life.

Explore Now
myRockwellAutomation
Careers
Investors
PartnerNetwork Portal
Contact Us
Resources
Popular Resources
Compatibility & Downloads (PCDC) Knowledgebase Literature Library Lifecycle Status Learning+ Training Portal
 
Product Management
Asset Management (RAAMP) Installed Base Evaluation (IBE) My Equipment Self-Service Product Registration Repairs Service Contracts & Tickets Software Activation Software Subscriptions Sustainability Dashboard
 
Product Configuration and Selection
Advisor Bill of Materials CrossWorks Integrated Architecture Builder Product Catalog ProposalWorks Proposal Builder ProposalWorks Standards Builder Safety Automation Builder
 

 

View All Tools →

Select country or region
  • Ukraine
  • Argentina
  • Australia
  • Belgique | Belgium
  • Brasil
  • Canada
  • Colombia
  • Czech Republic
  • Denmark
  • Deutschland
  • España
  • Finland
  • France
  • Hungary
  • India
  • Indonesia
  • Ireland
  • Israel
  • Italia
  • México
  • Netherlands
  • New Zealand
  • Norway
  • Poland
  • Portugal
  • Puerto Rico
  • Romania
  • Russia
  • Schweiz | Suisse
  • Singapore
  • South Africa
  • Sweden
  • Turkey
  • United Arab Emirates
  • United Kingdom
  • United States
  • Österreich
  • 中国
  • 台灣, 中國
  • 日本
  • 한국
Select language
  • English
  • Deutsch
  • Español
  • Français
  • Italiano
  • Português
  • 日本語
  • 简体中文
  • 繁體中文
  • 한국어
Sign In Create an Account
Why Create an Account?
Create bills of materials, submit repair quotes, register products and more!

Manage your e-communication subscription preferences.

Manage your user profile.
Welcome, {0}
Residing Location
My Account Sign Out
Your recent searches
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
All
Products
Documents
Downloads
Suggested search terms
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
Results for "{0}"
View all results
Product results for "{0}"
Product Image
Product Image
Product Image
View all product results
Document results for "{0}"
Portable Document Format.pdf file type
Publication Type: Published Date: Language:
Portable Document Format.pdf file type
Publication Type: Published Date: Language:
Portable Document Format.pdf file type
Publication Type: Published Date: Language:
View all document results
Download results for "{0}"
DownloadDownload
Catalog Numbers:
DownloadDownload
Catalog Numbers:
DownloadDownload
Catalog Numbers:
View all download results

PN965 | Stratix 5900 Security Updates

Advisory ID:
PN965
Published Date:
April 04, 2017
Last Updated:
April 04, 2017
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
No
Corrected:
No
Workaround:
No
CVE IDs
CVE-2015-1787,
CVE-2014-0195,
CVE-2014-2109,
CVE-2014-3566,
CVE-2016-1344,
CVE-2015-7702,
CVE-2015-7871,
CVE-2014-2106,
CVE-2015-0207,
CVE-2016-6393,
CVE-2014-3360,
CVE-2014-2112,
CVE-2016-6380,
CVE-2015-7691,
CVE-2015-7692,
CVE-2015-7849,
CVE-2015-0290,
CVE-2014-0224,
CVE-2015-7701,
CVE-2014-3470,
CVE-2014-2113,
CVE-2014-2108,
CVE-2015-7704,
CVE-2016-6415,
CVE-2014-2111,
CVE-2015-0642,
CVE-2015-1798,
CVE-2014-0221,
CVE-2015-0292,
CVE-2015-0293,
CVE-2015-7854,
CVE-2014-0076,
CVE-2015-0646,
CVE-2014-3361,
CVE-2016-6381,
CVE-2016-1409,
CVE-2015-7855,
CVE-2015-0291,
CVE-2015-7850,
CVE-2016-6384,
CVE-2014-3356,
CVE-2014-3354,
CVE-2014-3355,
CVE-2014-3299,
CVE-2015-7848,
CVE-2015-0289,
CVE-2015-7705,
CVE-2015-7703,
CVE-2015-7851,
CVE-2015-1799,
CVE-2016-6382,
CVE-2014-3359,
CVE-2015-0287,
CVE-2010-5298,
CVE-2015-7852,
CVE-2015-0209,
CVE-2015-0288,
CVE-2015-0285,
CVE-2014-0198,
CVE-2015-0643,
CVE-2015-7853,
CVE-2016-1350
Summary
Stratix 5900 Security Updates

Introduction

Stratix 5900 Security Updates

Description

Version 1.0 - April 4, 2017

Cisco Systems, Inc. ("Cisco") has reported that several vulnerabilities exist in versions the Stratix® 5900 Services Router software. The Stratix 5900 Services Router is capable of providing bridging, multi-protocol routing, and remote access services in industrial control systems.

Customers using affected versions of this software are encouraged to evaluate the mitigations provided below, and apply the applicable mitigations to their deployed products. Additional details relating to the discovered vulnerabilities, including affected products and recommended countermeasures, are provided herein.

AFFECTED PRODUCTS
Stratix 5900, All Versions prior to 15.6.3

VULNERABILITY DETAILS
Rockwell Automation evaluated the vulnerabilities using the Common Vulnerability Scoring System ("CVSS") v3.0.

Security Advisories that Affect this Release

CVE ID #

Headline

(linked to Cisco Advisory)

CVSS v3 Score and Vector String**

(**For a better understanding of how this score was generated, please follow the link to first.org)

CVE-2016-6393

Cisco IOS and IOS XE Software AAA Login Denial of Service Vulnerability

8.1/10 - High
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H

CVE-2016-6380

Cisco IOS and IOS XE Software DNS Forwarder Denial of Service Vulnerability

8.1/10 - High
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H

CVE-2016-6384

Cisco IOS and IOS XE Software H.323 Message Validation Denial of Service Vulnerability

8.6/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2016-6381

Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Fragmentation Denial of Service Vulnerability

6.8/10 - Medium
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2016-6382

Cisco IOS and IOS XE Software Multicast Routing Denial of Service Vulnerabilities

8.6/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2016-6415

IKEv1 Information Disclosure Vulnerability in Multiple Cisco Products

8.6/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

CVE-2016-1409

Cisco Products IPv6 Neighbor Discovery Crafted Packet Denial of Service Vulnerability

5.8/10 - Medium
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L

CVE-2016-1350

Cisco IOS and IOS XE and Cisco Unified Communications Manager Software Session Initiation Protocol Memory Leak Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2016-1344

Cisco IOS and IOS XE Software Internet Key Exchange Version 2 Fragmentation Denial of Service Vulnerability

6.8/10 - Medium

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2015-7691

CVE-2015-7692

CVE-2015-7701

CVE-2015-7702

CVE-2015-7703

CVE-2015-7704

CVE-2015-7705

CVE-2015-7848

CVE-2015-7849

CVE-2015-7850

CVE-2015-7851

CVE-2015-7852

CVE-2015-7853

CVE-2015-7854

CVE-2015-7855

CVE-2015-7871

Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015

7.2/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L

CVE-2015-1798

CVE-2015-1799

Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products

5.8/10 - Medium
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

CVE-2015-0642

CVE-2015-0643

Cisco IOS Software and IOS XE Software Internet Key Exchange Version 2 Denial of Service Vulnerabilities

8.6/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2015-0646

Cisco IOS Software and IOS XE Software TCP Packet Memory Leak Vulnerability

8.6/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2015-0207

CVE-2015-0209

CVE-2015-0285

CVE-2015-0287

CVE-2015-0288

CVE-2015-0289

CVE-2015-0290

CVE-2015-0291

CVE-2015-0292

CVE-2015-0293

CVE-2015-1787

Multiple Vulnerabilities in OpenSSL (March 2015) Affecting Cisco Products

4.0 - Medium

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N

CVE-2014-3566

SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability

4.0 - Medium

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N

CVE-2014-3359

Cisco IOS Software DHCP Version 6 Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-3355

CVE-2014-3356

Cisco IOS Software Metadata Vulnerabilities

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-3361

Cisco IOS Software Network Address Translation Denial of Service Vulnerability

6.8/10 - Medium

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-3354

Cisco IOS Software RSVP Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-3360

Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-3299

Cisco IOS Software IPsec Denial of Service Vulnerability

7.7/10 - High

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CVE-2010-5298

CVE-2014-0076

CVE-2014-0195

CVE-2014-0198

CVE-2014-0221

CVE-2014-0224

CVE-2014-3470

Multiple Vulnerabilities in OpenSSL Affecting Cisco Products

10/10 - Critical
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE-2014-2113

Cisco IOS Software Crafted IPv6 Packet Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-2108

Cisco IOS Software Internet Key Exchange Version 2 Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-2109

CVE-2014-2111

Cisco IOS Software Network Address Translation Vulnerabilities

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-2106

Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-2112

Cisco IOS Software SSL VPN Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

RISK MITIGATIONS and RECOMMENDED USER ACTIONS
Rockwell Automation has provided firmware version v15.6.3 as remediation for these vulnerabilities.

Product Name

Catalog Number

Suggested Actions

Stratix 5900 Services Router

1783-SRKIT

Update to v15.6.3 (Download)

Customers using affected products are encouraged to update to this latest version, which addresses the associated risk and includes added improvements to further harden the software and enhance its resilience against similar malicious attacks.

Customers who are unable to update their software are directed toward risk mitigation strategies provided below.

Where feasible, it is recommended to use the additional precautions and risk mitigation strategies listed below. When possible, multiple strategies should be employed simultaneously. Please click "Subscribe for Updates" in the upper right corner if you would like an email notification when this advisory is updated.

GENERAL SECURITY GUIDELINES

1. Help minimize any unnecessary network exposure by assessing all control system devices and/or systems, and confirm that firmware is kept up to date
2. Use proper network infrastructure controls, such as firewalls. As an extension to this approach, the Allen‑Bradley® Stratix 5950 Industrial Network Security Appliance offers an Intrusion Prevention System and an Intrusion Detection (IDS/IPS) System, and Deep Packet Inspection (DPI) technology of the Common Industrial Protocol (CIP). With the introduction of this new product, Rockwell Automation can offer customers an intrusion detection system to provide real-time visibility in the event that a vulnerability is being exploited. The Stratix 5950 Security Appliance uses Cisco FirePOWER™ technology, which allows created rules to be processed by Cisco TALOS for a variety of known security issues. Once configured with rules, the FirePOWER engine inspects the contents of every packet, looking for datapoints that correspond to one or more rules. Packets that have these signatures can be either logged using IDS or blocked using IPS. For further information on Rockwell Automation’s Vulnerability Handling process, please refer to our FAQs document.

For additional information on deploying the Stratix 5950, please see our Deploying Industrial Firewalls within a CPwE Architecture Guide.

Refer to http://www.rockwellautomation.com/rockwellautomation/products-technologies/network-technology/architectures.page for comprehensive information about implementing validated architectures designed to deliver these measures.

Refer to http://www.rockwellautomation.com/global/services/network-services/overview.page for information on Rockwell Automation network and security services to enable assessment, design, implementation and management of validated, secure network architectures.

We also recommend concerned customers continue to monitor this advisory with the Rockwell Automation Security Advisory Index at https://www.rockwellautomation.com/en-us/company/about-us/sustainability/trust-security/security-advisories.html, and the company public security webpage at http://www.rockwellautomation.com/security for new and relevant information relating to this matter.

Rockwell Automation remains committed to making security enhancements to our systems in the future. For more information and for assistance with assessing the state of security of your existing control system, including improving your system-level security when using Rockwell Automation and other vendor controls products, you can visit the Rockwell Automation Security Solutions web site at http://www.rockwellautomation.com/solutions/security.

ADDITIONAL LINKS

Security Advisory Index, Knowledgebase article KB:54102

Industrial Firewalls within a CPwE Architecture

Deploying Industrial Firewalls within a CPwE Architecture Design and Implementation Guide

·

KCS Status

Released

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left United Kingdom Chevron RightChevron Right
  2. Chevron LeftChevron Left Trust Center Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Security Adv Chevron RightChevron Right
  4. Chevron LeftChevron Left Industrial Security Advisory Detail Chevron RightChevron Right
Company
About Us Accessibility Careers Diversity, Ethics and Integrity Engage Online Community Investor Relations Modern Slavery Statement Sustainability Trust Center
 
News & Events
Newsroom Press Releases Automation Fair Upcoming Events
 
Trending Topics
Cybersecurity Digital Transformation Smart Manufacturing The Connected Enterprise®
 
Training
Webinars Workforce Development Training
 
PartnerNetwork
Find a Partner What is the PartnerNetwork?
 
Our Brands
Allen-Bradley FactoryTalk LifecycleIQ Services
Contact Us
TechConnect Support Customer Care General Inquiries How to Buy Report Ethical Concerns
Insights
ROKStudios Management Perspectives Results Achieved Case Studies Blogs Automation Today Podcasts
BlogRockwell Automation's Blog
UA | EN
Legal Notices
Privacy & Cookies Policy
Email Preferences
Cookie Settings
Accessibility Settings
© 2025 Rockwell Automation
United Kingdom
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our Privacy Policy
CloseClose