| Summary | An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG Associated Fault Codes: 0023, 002e, and 0037 Fault Type: Recoverable Description: The STI, EII, and HSC function files contain bits signifying whether or not a fault has occurred. Additionally there is a bit signaling the module to auto start. When these bits are set for any of the three modules and the device is moved into a run state, a fault is triggered. |
|---|---|
| Publication Date | April 6, 2018, 6:29 a.m. |
| Registration Date | Jan. 26, 2021, 1:15 p.m. |
| Last Update | Nov. 21, 2024, 12:12 p.m. |
| CVSS3.0 : CRITICAL | |
| スコア | 9.8 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| CVSS2.0 : HIGH | |
| Score | 7.5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:rockwellautomation:micrologix_1400_b_firmware:*:*:*:*:*:*:*:* | 21.2 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:* | ||||
| Title | Allen Bradley Micrologix 1400 Series B におけるアクセス制御に関する脆弱性 |
|---|---|
| Summary | Allen Bradley Micrologix 1400 Series B には、アクセス制御に関する脆弱性が存在します。 |
| Possible impacts | 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date | Sept. 22, 2017, midnight |
| Registration Date | June 7, 2018, 12:22 p.m. |
| Last Update | June 7, 2018, 12:22 p.m. |
| Rockwell Automation |
| Allen-Bradley Micrologix 1400 Series B FRN 21.2 およびそれ以前 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年06月07日] 掲載 |
June 7, 2018, 12:22 p.m. |