VAR-201301-0154

Vulnerability from variot - Updated: 2023-12-18 12:09

Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 do not properly perform authentication for Ethernet firmware updates, which allows remote attackers to execute arbitrary code via a Trojan horse update image. Rockwell Automation MicroLogix is a programmable controller platform. The device incorrectly authenticates the user, allows the remote user to upload a new firmware image onto the Ethernet card, and does not check whether the firmware image is legitimate or corrupt, allowing an attacker to exploit the vulnerability to gain control of the device or crash the device. Rockwell's products are affected by this vulnerability: all EtherNet/IP products that comply with CIP and EtherNet/IP specifications

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201301-0154",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "1756-enbt",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "1794-aentr flex i\\/o ethernet\\/ip adapter",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "flexlogix 1788-enbt adapter",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "compactlogix l35e controller",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "1768-eweb",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "compactlogix l32e controller",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "compactlogix controllers",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "19"
      },
      {
        "model": "micrologix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "1100"
      },
      {
        "model": "micrologix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "1400"
      },
      {
        "model": "1768-enbt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "compactlogix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "softlogix controllers",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "19"
      },
      {
        "model": "guardlogix controllers",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "20"
      },
      {
        "model": "1756-eweb",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "controllogix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "guardlogix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "softlogix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "controllogix controllers",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "20"
      },
      {
        "model": "1756-enbt",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "1756-eweb",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "1768-enbt",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "1768-eweb",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "compactlogix l32e controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "compactlogix l35e controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "compactlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "18"
      },
      {
        "model": "compactlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "19"
      },
      {
        "model": "controllogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "18"
      },
      {
        "model": "controllogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "20"
      },
      {
        "model": "flex i/o ethernet/ip adapter 1794-aentr",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "flexlogix 1788-enbt",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "guardlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "18"
      },
      {
        "model": "guardlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "20"
      },
      {
        "model": "micrologix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "1100"
      },
      {
        "model": "micrologix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "1400"
      },
      {
        "model": "softlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "18"
      },
      {
        "model": "softlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "19"
      },
      {
        "model": "automation controllogix",
        "scope": null,
        "trust": 0.6,
        "vendor": "rockwell",
        "version": null
      },
      {
        "model": "automation micrologix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1100"
      },
      {
        "model": "automation micrologix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1400"
      },
      {
        "model": "compactlogix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "controllogix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "softlogix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "guardlogix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "micrologix",
        "version": "*"
      },
      {
        "model": "automation softlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "19"
      },
      {
        "model": "automation softlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "18"
      },
      {
        "model": "automation micrologix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "14000"
      },
      {
        "model": "automation micrologix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "11000"
      },
      {
        "model": "automation guardlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "20"
      },
      {
        "model": "automation guardlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "18"
      },
      {
        "model": "automation compactlogix l35e",
        "scope": null,
        "trust": 0.3,
        "vendor": "rockwell",
        "version": null
      },
      {
        "model": "automation compactlogix l32e",
        "scope": null,
        "trust": 0.3,
        "vendor": "rockwell",
        "version": null
      },
      {
        "model": "automation compactlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "19"
      },
      {
        "model": "automation compactlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "18"
      },
      {
        "model": "automation 1794-aentr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": "automation 1788-enbt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": "automation 1768-eweb",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": "automation 1768-enbt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": "automation 1756-enbt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": "automation 1756-en2t series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "controllogix controllers",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "guardlogix controllers",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "softlogix controllers",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1756 enbt",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1756 eweb",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1768 enbt",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1768 eweb",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1794 aentr flex i o ethernet ip adapter",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "compactlogix",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "compactlogix controllers",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "compactlogix l32e controller",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "compactlogix l35e controller",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "controllogix",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "flexlogix 1788 enbt adapter",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "guardlogix",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "softlogix",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "BID",
        "id": "57317"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:controllogix:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:compactlogix:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:guardlogix:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:softlogix:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "18",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:compactlogix_l32e_controller:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:1794-aentr_flex_i\\/o_ethernet\\/ip_adapter:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:compactlogix_controllers:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "19",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:rockwellautomation:controllogix_controllers:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "20",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-enbt:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:1756-eweb:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:1768-enbt:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:1768-eweb:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1100",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1400",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:compactlogix_l35e_controller:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:rockwellautomation:flexlogix_1788-enbt_adapter:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:rockwellautomation:softlogix_controllers:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "19",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:rockwellautomation:guardlogix_controllers:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "20",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rub??n Santamarta",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2012-6437",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2012-6437",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "20403e12-2353-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-59718",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-6437",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201301-460",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "20403e12-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-59718",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 do not properly perform authentication for Ethernet firmware updates, which allows remote attackers to execute arbitrary code via a Trojan horse update image. Rockwell Automation MicroLogix is a programmable controller platform. The device incorrectly authenticates the user, allows the remote user to upload a new firmware image onto the Ethernet card, and does not check whether the firmware image is legitimate or corrupt, allowing an attacker to exploit the vulnerability to gain control of the device or crash the device. Rockwell\u0027s products are affected by this vulnerability: all EtherNet/IP products that comply with CIP and EtherNet/IP specifications",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "BID",
        "id": "57317"
      },
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-6437",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-13-011-03",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "57317",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "20403E12-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-89568",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "db": "BID",
        "id": "57317"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ]
  },
  "id": "VAR-201301-0154",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      }
    ],
    "trust": 1.6410444866666667
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:09:30.704000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.rockwellautomation.com/"
      },
      {
        "title": "Partner",
        "trust": 0.8,
        "url": "http://jp.rockwellautomation.com/applications/gs/ap/gsjp.nsf/pages/partner"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://jp.rockwellautomation.com/"
      },
      {
        "title": "Rockwell Automation ControlLogix Firmware Upload Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/29212"
      },
      {
        "title": "1768-ENBT_4.004.006",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=45390"
      },
      {
        "title": "1756-EWEB_4.016",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=45389"
      },
      {
        "title": "1756-ENBT_6.006",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=45388"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-13-011-03.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6437"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6437"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/57317"
      },
      {
        "trust": 0.3,
        "url": "http://www.rockwellautomation.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "db": "BID",
        "id": "57317"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "db": "BID",
        "id": "57317"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-01-17T00:00:00",
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2013-01-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "date": "2013-01-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "date": "2013-01-11T00:00:00",
        "db": "BID",
        "id": "57317"
      },
      {
        "date": "2013-01-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "date": "2013-01-24T21:55:01.523000",
        "db": "NVD",
        "id": "CVE-2012-6437"
      },
      {
        "date": "2013-01-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-05-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "date": "2013-01-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "date": "2013-01-11T00:00:00",
        "db": "BID",
        "id": "57317"
      },
      {
        "date": "2013-01-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "date": "2013-01-25T16:25:38.383000",
        "db": "NVD",
        "id": "CVE-2012-6437"
      },
      {
        "date": "2013-01-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation ControlLogix Firmware upload vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…