CVE-2019-10955
Vulnerability from cvelistv5
Published
2019-04-25 17:27
Modified
2024-08-04 22:40
Severity ?
EPSS score ?
Summary
In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earlier, MicroLogix 1100 Controllers v14.00 and earlier, CompactLogix 5370 L1 controllers v30.014 and earlier, CompactLogix 5370 L2 controllers v30.014 and earlier, CompactLogix 5370 L3 controllers (includes CompactLogix GuardLogix controllers) v30.014 and earlier, an open redirect vulnerability could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site that could run or download arbitrary malware on the user’s machine.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-19-113-01 | US Government Resource, Third Party Advisory | |
ics-cert@hq.dhs.gov | https://www.securityfocus.com/bid/108049 | Third Party Advisory, VDB Entry |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:15.190Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-113-01" }, { "name": "108049", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "https://www.securityfocus.com/bid/108049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MicroLogix 1400 Controllers", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "Series A" }, { "status": "affected", "version": "All Versions Series B" }, { "status": "affected", "version": "v15.002 and earlier" } ] }, { "product": "MicroLogix 1100 Controllers", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "v14.00 and earlier" } ] }, { "product": "CompactLogix 5370 L1 controllers", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "v30.014 and earlier" } ] }, { "product": "CompactLogix 5370 L2 controllers", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "v30.014 and earlier" } ] }, { "product": "CompactLogix 5370 L3 controllers", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "v30.014 and earlier" } ] } ], "datePublic": "2019-04-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earlier, MicroLogix 1100 Controllers v14.00 and earlier, CompactLogix 5370 L1 controllers v30.014 and earlier, CompactLogix 5370 L2 controllers v30.014 and earlier, CompactLogix 5370 L3 controllers (includes CompactLogix GuardLogix controllers) v30.014 and earlier, an open redirect vulnerability could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site that could run or download arbitrary malware on the user\u2019s machine." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "URL REDIRECTION TO UNTRUSTED SITE (\u0027OPEN REDIRECT\u0027) CWE-601", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-25T17:27:32", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-113-01" }, { "name": "108049", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "https://www.securityfocus.com/bid/108049" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2019-10955", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MicroLogix 1400 Controllers", "version": { "version_data": [ { "version_value": "Series A" }, { "version_value": "All Versions Series B" }, { "version_value": "v15.002 and earlier" } ] } }, { "product_name": "MicroLogix 1100 Controllers", "version": { "version_data": [ { "version_value": "v14.00 and earlier" } ] } }, { "product_name": "CompactLogix 5370 L1 controllers", "version": { "version_data": [ { "version_value": "v30.014 and earlier" } ] } }, { "product_name": "CompactLogix 5370 L2 controllers", "version": { "version_data": [ { "version_value": "v30.014 and earlier" } ] } }, { "product_name": "CompactLogix 5370 L3 controllers", "version": { "version_data": [ { "version_value": "v30.014 and earlier" } ] } } ] }, "vendor_name": "Rockwell Automation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earlier, MicroLogix 1100 Controllers v14.00 and earlier, CompactLogix 5370 L1 controllers v30.014 and earlier, CompactLogix 5370 L2 controllers v30.014 and earlier, CompactLogix 5370 L3 controllers (includes CompactLogix GuardLogix controllers) v30.014 and earlier, an open redirect vulnerability could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site that could run or download arbitrary malware on the user\u2019s machine." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "URL REDIRECTION TO UNTRUSTED SITE (\u0027OPEN REDIRECT\u0027) CWE-601" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-113-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-113-01" }, { "name": "108049", "refsource": "BID", "url": "https://www.securityfocus.com/bid/108049" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2019-10955", "datePublished": "2019-04-25T17:27:32", "dateReserved": "2019-04-08T00:00:00", "dateUpdated": "2024-08-04T22:40:15.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-10955\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2019-04-25T18:29:00.397\",\"lastModified\":\"2020-02-10T21:49:28.683\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earlier, MicroLogix 1100 Controllers v14.00 and earlier, CompactLogix 5370 L1 controllers v30.014 and earlier, CompactLogix 5370 L2 controllers v30.014 and earlier, CompactLogix 5370 L3 controllers (includes CompactLogix GuardLogix controllers) v30.014 and earlier, an open redirect vulnerability could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site that could run or download arbitrary malware on the user\u2019s machine.\"},{\"lang\":\"es\",\"value\":\"En los controladores Microwell\u00ae 1400 de Rockwell Automation serie A, todas las versiones serie B, v15.002 y anteriores, controladores MicroLogix 1100 v14.00 y anteriores, controladores CompactLogix 5370 L1 v30.014 y anteriores, controladores CompactLogix 5370 L2 v30.014 y anteriores, CompactLogix Controladores 5370 L3 (incluye controladores CompactLogix GuardLogix) v30.014 y anteriores, una vulnerabilidad de redireccionamiento abierto podr\u00eda permitir que un atacante remoto no autenticado ingrese un enlace malicioso para redirigir a los usuarios a un sitio malicioso que podr\u00eda ejecutar o descargar malware arbitrario en la m\u00e1quina del usuario.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]},{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"196EA0BE-FDF3-46BE-B3DA-5F49208C5D80\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:micrologix_1400_a_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614FFE85-E795-4590-B83D-87D759BA2AE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:micrologix_1400_b_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"15.002\",\"matchCriteriaId\":\"8C2D4BE4-7B3C-46E5-A173-EA4C6A67817E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rockwellautomation:micrologix_1100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA42C7F4-EEC1-44D2-BD46-237969FF6E1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:micrologix_1100_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"14.00\",\"matchCriteriaId\":\"0BE0BC36-5F12-431D-9DCB-B2D807BEC9FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rockwellautomation:compactlogix_5370_l1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"848B3145-24E4-445B-958A-4C3F84C4546C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:compactlogix_5370_l1_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"30.014\",\"matchCriteriaId\":\"52AF47ED-1C23-4396-B2A5-56BF4A5A68EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rockwellautomation:compactlogix_5370_l2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65092726-5567-488C-9E32-DC42D34E111D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:compactlogix_5370_l2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"30.014\",\"matchCriteriaId\":\"1A10A1AE-BD0D-4C80-957C-0B4404D07DD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rockwellautomation:compactlogix_5370_l3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C2F377-6F0D-4752-A4A3-C40604A8575D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:compactlogix_5370_l3_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"30.014\",\"matchCriteriaId\":\"1768393D-1A3B-4CB0-9111-DF1F2253DD5D\"}]}]}],\"references\":[{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-19-113-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"US Government Resource\",\"Third Party Advisory\"]},{\"url\":\"https://www.securityfocus.com/bid/108049\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.