This Product Notice informs you of a potential anomaly that exists with the Allen-Bradley® 1715-AENTR Ethernet/IP Adaptor Module, the AADvance® T9110 Processor Module, and the AADvance T9120 Processor Eurocard. When used with redundant power supplies, the affected module may not detect and report the loss of a single supply. If the redundant supply is subsequently lost, the system will lose all power and shut down without system notification
Product Notice 2019-07-001: An anomaly exists with firmware versions 29.011 and 32.011 used with CompactLogix and Compact GuardLogix controllers. Customers may experience a major non-recoverable fault. Correction requires firmware update. Hardware is not affected and may not be returned on this notification.
Product Safety Advisory 2019-08-001: An anomaly exists with Studio 5000 Logix Designer versions V32.00.00, V32.00.01, and V32.01.00. When used with 5380, 5480, and 5580 Logix controllers Function Block Functions may not execute properly following an online edit and subsequent upload/download of the controller application. Correction requires updating Studio 5000 Logix Designer. Hardware is not affected and may not be returned on this notification.
A vulnerability has been discovered in certain versions of MicroLogix 1400 ™ controllers and 1756 ControlLogix® Ethernet/IP Communication modules, which could potentially allow an IP configuration change to occur even when the controller keyswitch is set to Hard Run.
A remote, unauthenticated attacker could request a connection with an affected module and then send an IP configuration change request, which may result in a halt of Ethernet/IP traffic between the affected device and the rest of the system.
This Product Notice informs customers of a required firmware update for Trusted® T8111C TMR Processor Modules shipped with firmware release O10. Customers are advised to update to firmware version O11 or later. Details, including corrective actions, may be found on the Rockwell Automation Knowledgebase Article ID 1075973. Contact the Rockwell Automation Product Safety Group at firstname.lastname@example.org.
This Product Notice informs you of the effect a recent Microsoft Windows Security Update will have on select Rockwell Automation software products. When the patch is applied to specific Microsoft Windows platforms hosting Connected Components Workbench™ (CCW), ISaGRAF®, AADvance® Workbench, and vMonitor®, project files for these products cannot be opened. In some instances, the project files may become corrupt.
This Product Safety Advisory informs you of a potential anomaly that exists with the Trusted T8111 TMR Processor Module. When used in a dual processor redundant configuration with a second T8111 processor module or a T8110 processor module, the Active processor may go into its shutdown state with the second Standby module not becoming Active. This is due to the Active / Standby link between the two processors becoming synchronized, causing interference with the diagnostics. This may result in a full system shutdown.
Vulnerabilities have been discovered in certain software components of FactoryTalk® Services Platform that may cause a Denial of Service due resource exhaustion. A remote, unauthenticated threat actor could utilize this vulnerability to send a series of crafted packets to the affected ports. As of this announcement and to the current knowledge of Rockwell Automation, there is no publicly available exploit code relating to this vulnerability.