Логотип exploitDog
bind:CVE-2018-17924
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-17924

Количество 3

Количество 3

nvd логотип

CVE-2018-17924

около 7 лет назад

Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-w6vr-5wrp-c9p7

почти 4 года назад

Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2019-01739

около 7 лет назад

Уязвимость микропрограммного обеспечения программируемого логического контроллера MicroLogix 1400 и коммуникационного модуля 1756 ControlLogix, связаная с отсутствием аутентификации для критичной функции, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-17924

Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.

CVSS3: 8.6
0%
Низкий
около 7 лет назад
github логотип
GHSA-w6vr-5wrp-c9p7

Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.

CVSS3: 8.6
0%
Низкий
почти 4 года назад
fstec логотип
BDU:2019-01739

Уязвимость микропрограммного обеспечения программируемого логического контроллера MicroLogix 1400 и коммуникационного модуля 1756 ControlLogix, связаная с отсутствием аутентификации для критичной функции, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
0%
Низкий
около 7 лет назад

Уязвимостей на страницу