VAR-201204-0173
Vulnerability from variot - Updated: 2023-12-18 13:34The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 does not properly handle the return value from an unspecified function, which allows remote attackers to cause a denial of service (service outage) via a crafted packet. Rockwell Automation is a provider of industrial automation, control and information technology solutions. Rockwell Automation FactoryTalk Activation Server RNADiagReceiver has errors in processing packets. Submitting a packet containing more than 2000 bytes to UDP port 4445 can result in no subsequent connections. An attacker can exploit these issues to crash the affected application, denying service to legitimate users
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201204-0173",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "automation factorytalk activation server",
"scope": "eq",
"trust": 1.7,
"vendor": "rockwall",
"version": "3.2"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 1.7,
"vendor": "rockwall",
"version": "500019"
},
{
"model": "factorytalk",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "cpr9_sr5"
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "20"
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "17"
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "19"
},
{
"model": "factorytalk",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "cpr9"
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "18"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 1.5,
"vendor": "rockwall",
"version": "500018"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 1.5,
"vendor": "rockwall",
"version": "500017"
},
{
"model": "factorytalk",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "cpr9 to sr5"
},
{
"model": "rslogix 5000",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "17 to 20"
},
{
"model": null,
"scope": null,
"trust": 0.6,
"vendor": "no",
"version": null
},
{
"model": "cpr9",
"scope": null,
"trust": 0.4,
"vendor": "factorytalk",
"version": null
},
{
"model": "cpr9 sr5",
"scope": null,
"trust": 0.4,
"vendor": "factorytalk",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "rslogix 5000",
"version": "17"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "rslogix 5000",
"version": "18"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "rslogix 5000",
"version": "19"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "rslogix 5000",
"version": "20"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.4,
"vendor": "rockwall",
"version": "500018*"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.4,
"vendor": "rockwall",
"version": "500017*"
},
{
"model": "automation factorytalk cpr9-sr5",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr4",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr3",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr2",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9-sr1",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk cpr9",
"scope": null,
"trust": 0.3,
"vendor": "rockwall",
"version": null
},
{
"model": "automation factorytalk",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwall",
"version": "0"
},
{
"model": "automation rslogix",
"scope": "eq",
"trust": 0.2,
"vendor": "rockwall",
"version": "500019*"
},
{
"model": "automation factorytalk activation server",
"scope": "eq",
"trust": 0.2,
"vendor": "rockwall",
"version": "3.2*"
}
],
"sources": [
{
"db": "IVD",
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1"
},
{
"db": "IVD",
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "ef44ea94-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0999908-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8875"
},
{
"db": "BID",
"id": "51444"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001982"
},
{
"db": "NVD",
"id": "CVE-2012-0221"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-003"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:factorytalk:cpr9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000:17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000:18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000:19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:rslogix_5000:20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:factorytalk:cpr9_sr5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2012-0221"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Luigi Auriemma",
"sources": [
{
"db": "BID",
"id": "51444"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-287"
}
],
"trust": 0.9
},
"cve": "CVE-2012-0221",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2012-0221",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2012-8875",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "ef44ea94-1f77-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "f0999908-1f77-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-53502",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2012-0221",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2012-8875",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201204-003",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "ef44ea94-1f77-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "f0999908-1f77-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-53502",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1"
},
{
"db": "IVD",
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "ef44ea94-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0999908-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-8875"
},
{
"db": "VULHUB",
"id": "VHN-53502"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001982"
},
{
"db": "NVD",
"id": "CVE-2012-0221"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-003"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 does not properly handle the return value from an unspecified function, which allows remote attackers to cause a denial of service (service outage) via a crafted packet. Rockwell Automation is a provider of industrial automation, control and information technology solutions. Rockwell Automation FactoryTalk Activation Server RNADiagReceiver has errors in processing packets. Submitting a packet containing more than 2000 bytes to UDP port 4445 can result in no subsequent connections. \nAn attacker can exploit these issues to crash the affected application, denying service to legitimate users",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-0221"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001982"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8875"
},
{
"db": "BID",
"id": "51444"
},
{
"db": "IVD",
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1"
},
{
"db": "IVD",
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "ef44ea94-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0999908-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-53502"
}
],
"trust": 4.32
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-53502",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-53502"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-0221",
"trust": 4.2
},
{
"db": "ICS CERT",
"id": "ICSA-12-088-01",
"trust": 3.4
},
{
"db": "BID",
"id": "51444",
"trust": 2.1
},
{
"db": "CNNVD",
"id": "CNNVD-201204-003",
"trust": 1.5
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-12-017-01",
"trust": 1.1
},
{
"db": "CNVD",
"id": "CNVD-2012-8875",
"trust": 1.0
},
{
"db": "CNVD",
"id": "CNVD-2012-0190",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2012-0189",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001982",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201201-287",
"trust": 0.6
},
{
"db": "IVD",
"id": "7D70A8CF-463F-11E9-B5ED-000C29342CB1",
"trust": 0.2
},
{
"db": "IVD",
"id": "FA04EF80-2353-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "EF44EA94-1F77-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "F0999908-1F77-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "SEEBUG",
"id": "SSVID-72115",
"trust": 0.1
},
{
"db": "EXPLOIT-DB",
"id": "36570",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-53502",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1"
},
{
"db": "IVD",
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "ef44ea94-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0999908-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8875"
},
{
"db": "VULHUB",
"id": "VHN-53502"
},
{
"db": "BID",
"id": "51444"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001982"
},
{
"db": "NVD",
"id": "CVE-2012-0221"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-003"
}
]
},
"id": "VAR-201204-0173",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1"
},
{
"db": "IVD",
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "ef44ea94-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0999908-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8875"
},
{
"db": "VULHUB",
"id": "VHN-53502"
}
],
"trust": 3.5250000000000004
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 2.6
}
],
"sources": [
{
"db": "IVD",
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1"
},
{
"db": "IVD",
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "ef44ea94-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0999908-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8875"
}
]
},
"last_update_date": "2023-12-18T13:34:53.269000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "RSLogix 5000",
"trust": 0.8,
"url": "http://www.rockwellautomation.com/rockwellsoftware/design/rslogix5000/"
},
{
"title": "FactoryTalk",
"trust": 0.8,
"url": "http://www.rockwellautomation.com/rockwellsoftware/factorytalk/"
},
{
"title": "Rockwell Automation Allen-Bradley FactoryTalk Input Validation Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/36065"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-8875"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001982"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-53502"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001982"
},
{
"db": "NVD",
"id": "CVE-2012-0221"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-088-01.pdf"
},
{
"trust": 1.7,
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937"
},
{
"trust": 1.5,
"url": "http://aluigi.altervista.org/adv/rnadiagreceiver_1-adv.txt"
},
{
"trust": 1.1,
"url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-017-01.pdf"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0221"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0221"
},
{
"trust": 0.6,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-12-088-01"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/51444"
},
{
"trust": 0.3,
"url": "http://www.rockwellautomation.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8875"
},
{
"db": "VULHUB",
"id": "VHN-53502"
},
{
"db": "BID",
"id": "51444"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001982"
},
{
"db": "NVD",
"id": "CVE-2012-0221"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-003"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1"
},
{
"db": "IVD",
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "ef44ea94-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0999908-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"db": "CNVD",
"id": "CNVD-2012-8875"
},
{
"db": "VULHUB",
"id": "VHN-53502"
},
{
"db": "BID",
"id": "51444"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-001982"
},
{
"db": "NVD",
"id": "CVE-2012-0221"
},
{
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-003"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-04-05T00:00:00",
"db": "IVD",
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1"
},
{
"date": "2012-04-05T00:00:00",
"db": "IVD",
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d"
},
{
"date": "2012-01-19T00:00:00",
"db": "IVD",
"id": "ef44ea94-1f77-11e6-abef-000c29c66e3d"
},
{
"date": "2012-01-19T00:00:00",
"db": "IVD",
"id": "f0999908-1f77-11e6-abef-000c29c66e3d"
},
{
"date": "2012-01-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"date": "2012-01-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"date": "2012-04-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-8875"
},
{
"date": "2012-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-53502"
},
{
"date": "2012-01-17T00:00:00",
"db": "BID",
"id": "51444"
},
{
"date": "2012-04-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-001982"
},
{
"date": "2012-04-02T18:55:01.043000",
"db": "NVD",
"id": "CVE-2012-0221"
},
{
"date": "1900-01-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"date": "2012-04-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201204-003"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2012-01-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-0190"
},
{
"date": "2012-01-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-0189"
},
{
"date": "2012-04-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-8875"
},
{
"date": "2012-04-03T00:00:00",
"db": "VULHUB",
"id": "VHN-53502"
},
{
"date": "2012-03-28T22:10:00",
"db": "BID",
"id": "51444"
},
{
"date": "2012-04-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-001982"
},
{
"date": "2012-04-03T04:00:00",
"db": "NVD",
"id": "CVE-2012-0221"
},
{
"date": "2012-01-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"date": "2012-04-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201204-003"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201201-287"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-003"
}
],
"trust": 1.2
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell Automation Allen-Bradley FactoryTalk Input validation vulnerability",
"sources": [
{
"db": "IVD",
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1"
},
{
"db": "IVD",
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2012-8875"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-003"
}
],
"trust": 1.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation",
"sources": [
{
"db": "IVD",
"id": "7d70a8cf-463f-11e9-b5ed-000c29342cb1"
},
{
"db": "IVD",
"id": "fa04ef80-2353-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "ef44ea94-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "f0999908-1f77-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201204-003"
}
],
"trust": 1.4
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…