### [CVE-2021-33012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33012) ![](https://img.shields.io/static/v1?label=Product&message=Rockwell%20Automation%20MicroLogix%201100&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=All%20Versions%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=IMPROPER%20INPUT%20VALIDATION%20CWE-20&color=brightgreen) ### Description Rockwell Automation MicroLogix 1100, all versions, allows a remote, unauthenticated attacker sending specially crafted commands to cause the PLC to fault when the controller is switched to RUN mode, which results in a denial-of-service condition. If successfully exploited, this vulnerability will cause the controller to fault whenever the controller is switched to RUN mode. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/btaub/industrial