Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-6442

Опубликовано: 24 янв. 2013
Источник: nvd
CVSS2: 7.8
CVSS2: 7.8
EPSS Средний

Описание

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the product to reset, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.

Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:rockwellautomation:ethernet\/ip_firmware:-:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:rockwellautomation:1756-enbt:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:1756-eweb:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:1768-enbt:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:1768-eweb:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:rockwellautomation:compactlogix_firmware:-:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:rockwellautomation:l32e:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:l35e:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:rockwellautomation:flexlogix_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:1788-enbt:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:rockwellautomation:flex_i\/o_ethernet\/ip__firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:1794-aentr:-:*:*:*:*:*:*:*
Конфигурация 5

Одновременно

cpe:2.3:o:rockwellautomation:micrologix_firmware:-:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:rockwellautomation:1100:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:1400:-:*:*:*:*:*:*:*
Конфигурация 6

Одно из

cpe:2.3:o:rockwellautomation:compactlogix_controllers_firmware:19:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:compactlogix_firmware:18:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:controllogix_controllers_firmware:20:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:controllogix_firmware:18:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:guardlogix_controllers_firmware:20:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:guardlogix_firmware:18:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:softlogix_controllers_firmware:19:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:softlogix_firmware:18:*:*:*:*:*:*:*

EPSS

Процентиль: 93%
0.10272
Средний

7.8 High

CVSS2

7.8 High

CVSS2

Дефекты

CWE-284
CWE-119

Связанные уязвимости

github
больше 3 лет назад

Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that specifies a reset.

EPSS

Процентиль: 93%
0.10272
Средний

7.8 High

CVSS2

7.8 High

CVSS2

Дефекты

CWE-284
CWE-119