Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials.
2020-03-16T16:15:14.767
2024-11-21T05:36:26.567
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | rockwellautomation | micrologix_1400_a_firmware | * | Yes |
Operating System | rockwellautomation | micrologix_1400_b_firmware | ≤ 21.001 | Yes |
Hardware | rockwellautomation | micrologix_1400 | - | No |
Operating System | rockwellautomation | micrologix_1100_firmware | * | Yes |
Hardware | rockwellautomation | micrologix_1100 | - | No |
Application | rockwellautomation | rslogix_500 | ≤ 12.001 | Yes |