Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-6440

Опубликовано: 24 янв. 2013
Источник: nvd
CVSS2: 9.3
CVSS2: 9.3
EPSS Низкий

Описание

The Web server password authentication mechanism used by the products is vulnerable to a MitM and Replay attack. Successful exploitation of this vulnerability will allow unauthorized access of the product’s Web server to view and alter product configuration and diagnostics information.

Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:rockwellautomation:controllogix_controllers:*:*:*:*:*:*:*:*
Версия до 20 (включая)
cpe:2.3:a:rockwellautomation:guardlogix_controllers:*:*:*:*:*:*:*:*
Версия до 20 (включая)
cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:*
Версия до 1100 (включая)
cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:*
Версия до 1400 (включая)
cpe:2.3:a:rockwellautomation:softlogix_controllers:*:*:*:*:*:*:*:*
Версия до 19 (включая)
cpe:2.3:h:rockwellautomation:1756-enbt:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:1756-eweb:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:1768-enbt:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:1768-eweb:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:1794-aentr_flex_i\/o_ethernet\/ip_adapter:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix:*:*:*:*:*:*:*:*
Версия до 18 (включая)
cpe:2.3:h:rockwellautomation:compactlogix_controllers:*:*:*:*:*:*:*:*
Версия до 19 (включая)
cpe:2.3:h:rockwellautomation:compactlogix_l32e_controller:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:compactlogix_l35e_controller:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:controllogix:*:*:*:*:*:*:*:*
Версия до 18 (включая)
cpe:2.3:h:rockwellautomation:flexlogix_1788-enbt_adapter:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:guardlogix:*:*:*:*:*:*:*:*
Версия до 18 (включая)
cpe:2.3:h:rockwellautomation:softlogix:*:*:*:*:*:*:*:*
Версия до 18 (включая)

EPSS

Процентиль: 78%
0.01169
Низкий

9.3 Critical

CVSS2

9.3 Critical

CVSS2

Дефекты

CWE-287
CWE-287

Связанные уязвимости

github
больше 3 лет назад

The web-server password-authentication functionality in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows man-in-the-middle attackers to conduct replay attacks via HTTP traffic.

EPSS

Процентиль: 78%
0.01169
Низкий

9.3 Critical

CVSS2

9.3 Critical

CVSS2

Дефекты

CWE-287
CWE-287