CNVD-2020-19520

Vulnerability from cnvd - Published: 2020-03-26
VLAI Severity ?
Title
多款Rockwell Automation产品授权问题漏洞
Description
Rockwell Automation MicroLogix 1400 Controllers Series A等都是美国罗克韦尔(Rockwell Automation)公司的产品。Rockwell Automation MicroLogix 1400 Controllers Series A是一款可编程逻辑控制器。MicroLogix 1100 Controllers是一款可编程逻辑控制器。RSLogix 500 Software是一套用于工业控制系统的编程软件。 多款Rockwell Automation产品存在授权问题漏洞,远程攻击者可利用该漏洞绕过身份验证,获取敏感信息或凭证。
Severity
Patch Name
多款Rockwell Automation产品授权问题漏洞的补丁
Patch Description
Rockwell Automation MicroLogix 1400 Controllers Series A等都是美国罗克韦尔(Rockwell Automation)公司的产品。Rockwell Automation MicroLogix 1400 Controllers Series A是一款可编程逻辑控制器。MicroLogix 1100 Controllers是一款可编程逻辑控制器。RSLogix 500 Software是一套用于工业控制系统的编程软件。 多款Rockwell Automation产品存在授权问题漏洞,远程攻击者可利用该漏洞绕过身份验证,获取敏感信息或凭证。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://www.rockwellautomation.com/

Reference
https://www.us-cert.gov/ics/advisories/icsa-20-070-06
Impacted products
Name
['Rockwell Automation MicroLogix 1400 Controllers Series A', 'Rockwell Automation MicroLogix 1400 Controllers Series B <=21.001', 'Rockwell Automation MicroLogix 1100 Controllers', 'Rockwell Automation RSLogix 500 Software <=12.001']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2020-6988"
    }
  },
  "description": "Rockwell Automation MicroLogix 1400 Controllers Series A\u7b49\u90fd\u662f\u7f8e\u56fd\u7f57\u514b\u97e6\u5c14\uff08Rockwell Automation\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Rockwell Automation MicroLogix 1400 Controllers Series A\u662f\u4e00\u6b3e\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002MicroLogix 1100 Controllers\u662f\u4e00\u6b3e\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002RSLogix 500 Software\u662f\u4e00\u5957\u7528\u4e8e\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u7684\u7f16\u7a0b\u8f6f\u4ef6\u3002\n\n\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u5b58\u5728\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\uff0c\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u6216\u51ed\u8bc1\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.rockwellautomation.com/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2020-19520",
  "openTime": "2020-03-26",
  "patchDescription": "Rockwell Automation MicroLogix 1400 Controllers Series A\u7b49\u90fd\u662f\u7f8e\u56fd\u7f57\u514b\u97e6\u5c14\uff08Rockwell Automation\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Rockwell Automation MicroLogix 1400 Controllers Series A\u662f\u4e00\u6b3e\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002MicroLogix 1100 Controllers\u662f\u4e00\u6b3e\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002RSLogix 500 Software\u662f\u4e00\u5957\u7528\u4e8e\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u7684\u7f16\u7a0b\u8f6f\u4ef6\u3002\r\n\r\n\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u5b58\u5728\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u8eab\u4efd\u9a8c\u8bc1\uff0c\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u6216\u51ed\u8bc1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Rockwell Automation MicroLogix 1400 Controllers Series A",
      "Rockwell Automation MicroLogix 1400 Controllers Series B \u003c=21.001",
      "Rockwell Automation MicroLogix 1100 Controllers",
      "Rockwell Automation RSLogix 500 Software \u003c=12.001"
    ]
  },
  "referenceLink": "https://www.us-cert.gov/ics/advisories/icsa-20-070-06",
  "serverity": "\u4e2d",
  "submitTime": "2020-03-11",
  "title": "\u591a\u6b3eRockwell Automation\u4ea7\u54c1\u6388\u6743\u95ee\u9898\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…