CNVD-2026-17207

Vulnerability from cnvd - Published: 2026-04-14
VLAI Severity ?
Title
Rockwell Automation MicroLogix 1100和MicroLogix 1400跨站脚本漏洞
Description
Rockwell Automation MicroLogix 1400和Rockwell Automation MicroLogix 1100都是美国罗克韦尔(Rockwell Automation)公司的产品。Rockwell Automation MicroLogix 1400是一款可编程逻辑控制器。Rockwell Automation MicroLogix 1100是一种可编程逻辑控制器系统。 MicroLogix 1100和1400 controllers存在安全漏洞,攻击者利用该漏洞可以远程代码执行。
Severity
Patch Name
Rockwell Automation MicroLogix 1100和MicroLogix 1400跨站脚本漏洞的补丁
Patch Description
Rockwell Automation MicroLogix 1400和Rockwell Automation MicroLogix 1100都是美国罗克韦尔(Rockwell Automation)公司的产品。Rockwell Automation MicroLogix 1400是一款可编程逻辑控制器。Rockwell Automation MicroLogix 1100是一种可编程逻辑控制器系统。 MicroLogix 1100和1400 controllers存在安全漏洞,攻击者利用该漏洞可以远程代码执行。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137679

Reference
https://nvd.nist.gov/vuln/detail/CVE-2022-46670
Impacted products
Name
['Rockwell Automation MicroLogix 1400', 'Rockwell Automation MicroLogix 1100']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2022-46670",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-46670"
    }
  },
  "description": "Rockwell Automation MicroLogix 1400\u548cRockwell Automation MicroLogix 1100\u90fd\u662f\u7f8e\u56fd\u7f57\u514b\u97e6\u5c14\uff08Rockwell Automation\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Rockwell Automation MicroLogix 1400\u662f\u4e00\u6b3e\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002Rockwell Automation MicroLogix 1100\u662f\u4e00\u79cd\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u7cfb\u7edf\u3002\n\nMicroLogix 1100\u548c1400 controllers\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u53ef\u4ee5\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137679",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2026-17207",
  "openTime": "2026-04-14",
  "patchDescription": "Rockwell Automation MicroLogix 1400\u548cRockwell Automation MicroLogix 1100\u90fd\u662f\u7f8e\u56fd\u7f57\u514b\u97e6\u5c14\uff08Rockwell Automation\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Rockwell Automation MicroLogix 1400\u662f\u4e00\u6b3e\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002Rockwell Automation MicroLogix 1100\u662f\u4e00\u79cd\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u7cfb\u7edf\u3002\r\n\r\nMicroLogix 1100\u548c1400 controllers\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u53ef\u4ee5\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Rockwell Automation MicroLogix 1100\u548cMicroLogix 1400\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Rockwell Automation MicroLogix 1400",
      "Rockwell Automation MicroLogix 1100"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-46670",
  "serverity": "\u4e2d",
  "submitTime": "2022-12-20",
  "title": "Rockwell Automation MicroLogix 1100\u548cMicroLogix 1400\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…