Логотип exploitDog
bind:CVE-2020-6988
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-6988

Количество 3

Количество 3

nvd логотип

CVE-2020-6988

почти 6 лет назад

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-8v4g-559x-qqxm

больше 3 лет назад

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials.

EPSS: Низкий
fstec логотип

BDU:2020-01008

почти 6 лет назад

Уязвимость программного обеспечения RSLogix 500, программируемых логических контроллеров MicroLogix 1100 и MicroLogix 1400, позволяющая нарушителю раскрыть конфиденциальную информацию

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-6988

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials.

CVSS3: 7.5
0%
Низкий
почти 6 лет назад
github логотип
GHSA-8v4g-559x-qqxm

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01008

Уязвимость программного обеспечения RSLogix 500, программируемых логических контроллеров MicroLogix 1100 и MicroLogix 1400, позволяющая нарушителю раскрыть конфиденциальную информацию

CVSS3: 7.5
0%
Низкий
почти 6 лет назад

Уязвимостей на страницу