VAR-201702-0922
Vulnerability from variot - Updated: 2023-12-18 13:39An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. User credentials are sent to the web server in clear text, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server. Rockwell Automation is a UK company providing information on industrial automation control and globalization. The MicroLogix 1100 and 1400 Series products are used in food, agriculture, and water and wastewater systems. There are unauthorized access vulnerabilities in Rockwell Automation MicroLogix 1100 and 1400. The attacker exploited the vulnerability to obtain sensitive information, unauthorized access to the affected device or denial of service. An attacker could exploit this vulnerability to obtain certificates
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0922",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "1763-l16dwd series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "14.000"
},
{
"model": "1766-l32awaa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32bwa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32bwaa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32bxba series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1763-l16bbb series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "14.000"
},
{
"model": "1763-l16bbb series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "14.000"
},
{
"model": "1766-l32awa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32bwa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32awaa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32bxb series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1763-l16bwa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "14.000"
},
{
"model": "1763-l16awa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "14.000"
},
{
"model": "1766-l32awa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1763-l16dwd series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "14.000"
},
{
"model": "1763-l16awa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "14.000"
},
{
"model": "1766-l32bxb series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1763-l16bwa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "14.000"
},
{
"model": "1766-l32bwaa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32bxba series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1100 1763-l16awa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "14.000"
},
{
"model": "allen-bradley micrologix 1100 1763-l16awa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "14.000"
},
{
"model": "allen-bradley micrologix 1100 1763-l16bbb series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "14.000"
},
{
"model": "allen-bradley micrologix 1100 1763-l16bbb series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "14.000"
},
{
"model": "allen-bradley micrologix 1100 1763-l16bwa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "14.000"
},
{
"model": "allen-bradley micrologix 1100 1763-l16bwa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "14.000"
},
{
"model": "allen-bradley micrologix 1100 1763-l16dwd series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "14.000"
},
{
"model": "allen-bradley micrologix 1100 1763-l16dwd series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "14.000"
},
{
"model": "allen-bradley micrologix 1400 1766-l32awa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1400 1766-l32awa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1400 1766-l32awaa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1400 1766-l32awaa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bwa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bwa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bwaa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bwaa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bxb series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bxb series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bxba series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bxba series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "15.004"
},
{
"model": "automation micrologix",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1100"
},
{
"model": "automation micrologix",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1400"
},
{
"model": "1766-l32bwaa series a",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1763-l16awa series a",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "14.000"
},
{
"model": "1766-l32bxba series a",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32awaa series b",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32bxb series a",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32bxba series b",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1763-l16bwa series a",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "14.000"
},
{
"model": "1766-l32bxb series b",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32awaa series a",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "1766-l32awa series b",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "15.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxba series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxba series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxb series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxb series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwaa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwaa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32awaa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32awaa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32awa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32awa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1763-l16dwd series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16dwd series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bwa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bwa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bbb series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bbb series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16awa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16awa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxba series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.000"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxb series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.000"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwaa series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.000"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwa series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.000"
},
{
"model": "automation allen-bradley micrologix 1766-l32awaa series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.000"
},
{
"model": "automation allen-bradley micrologix 1766-l32awa series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16dwd series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "110015.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bwa series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "110015.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bbb series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "110015.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16awa series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "110015.000"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16awa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16awa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16bbb series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16bbb series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16bwa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16bwa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16dwd series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16dwd series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32awa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32awa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32awaa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32awaa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bwa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bwa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bwaa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bwaa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bxb series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bxb series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bxba series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bxba series b",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e32f3890-85d5-4037-bb89-489e24febb37"
},
{
"db": "CNVD",
"id": "CNVD-2017-00318"
},
{
"db": "BID",
"id": "95302"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008008"
},
{
"db": "NVD",
"id": "CVE-2016-9334"
},
{
"db": "CNNVD",
"id": "CNNVD-201701-156"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32awaa_series_a:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32awaa_series_b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32bxba_series_a:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1763-l16bbb_series_a:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.000",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1763-l16dwd_series_b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.000",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1763-l16dwd_series_a:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.000",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1763-l16bwa_series_b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.000",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32bxb_series_a:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32bwaa_series_a:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32awa_series_b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1763-l16awa_series_a:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.000",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32bwaa_series_b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32bwa_series_a:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32bwa_series_b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32awa_series_a:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32bxba_series_b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1766-l32bxb_series_b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.004",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1763-l16awa_series_b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.000",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1763-l16bbb_series_b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.000",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:1763-l16bwa_series_a:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.000",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9334"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Alexey Osipov and Ilya Karpov of Positive Technologies",
"sources": [
{
"db": "BID",
"id": "95302"
},
{
"db": "CNNVD",
"id": "CNNVD-201701-156"
}
],
"trust": 0.9
},
"cve": "CVE-2016-9334",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2016-9334",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-00318",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "e32f3890-85d5-4037-bb89-489e24febb37",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-98154",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "Low",
"baseScore": 7.3,
"baseSeverity": "High",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2016-9334",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-9334",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2017-00318",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201701-156",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "e32f3890-85d5-4037-bb89-489e24febb37",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-98154",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e32f3890-85d5-4037-bb89-489e24febb37"
},
{
"db": "CNVD",
"id": "CNVD-2017-00318"
},
{
"db": "VULHUB",
"id": "VHN-98154"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008008"
},
{
"db": "NVD",
"id": "CVE-2016-9334"
},
{
"db": "CNNVD",
"id": "CNNVD-201701-156"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. User credentials are sent to the web server in clear text, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server. Rockwell Automation is a UK company providing information on industrial automation control and globalization. The MicroLogix 1100 and 1400 Series products are used in food, agriculture, and water and wastewater systems. There are unauthorized access vulnerabilities in Rockwell Automation MicroLogix 1100 and 1400. The attacker exploited the vulnerability to obtain sensitive information, unauthorized access to the affected device or denial of service. An attacker could exploit this vulnerability to obtain certificates",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9334"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008008"
},
{
"db": "CNVD",
"id": "CNVD-2017-00318"
},
{
"db": "BID",
"id": "95302"
},
{
"db": "IVD",
"id": "e32f3890-85d5-4037-bb89-489e24febb37"
},
{
"db": "VULHUB",
"id": "VHN-98154"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-9334",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-16-336-06",
"trust": 2.8
},
{
"db": "BID",
"id": "95302",
"trust": 2.6
},
{
"db": "CNNVD",
"id": "CNNVD-201701-156",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-00318",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008008",
"trust": 0.8
},
{
"db": "IVD",
"id": "E32F3890-85D5-4037-BB89-489E24FEBB37",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-98154",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e32f3890-85d5-4037-bb89-489e24febb37"
},
{
"db": "CNVD",
"id": "CNVD-2017-00318"
},
{
"db": "VULHUB",
"id": "VHN-98154"
},
{
"db": "BID",
"id": "95302"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008008"
},
{
"db": "NVD",
"id": "CVE-2016-9334"
},
{
"db": "CNNVD",
"id": "CNNVD-201701-156"
}
]
},
"id": "VAR-201702-0922",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e32f3890-85d5-4037-bb89-489e24febb37"
},
{
"db": "CNVD",
"id": "CNVD-2017-00318"
},
{
"db": "VULHUB",
"id": "VHN-98154"
}
],
"trust": 1.7093156927272726
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e32f3890-85d5-4037-bb89-489e24febb37"
},
{
"db": "CNVD",
"id": "CNVD-2017-00318"
}
]
},
"last_update_date": "2023-12-18T13:39:04.114000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "MicroLogix 1100\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9",
"trust": 0.8,
"url": "http://ab.rockwellautomation.com/ja/programmable-controllers/micrologix-1100"
},
{
"title": "MicroLogix 1400\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9",
"trust": 0.8,
"url": "http://ab.rockwellautomation.com/ja/programmable-controllers/micrologix-1400"
},
{
"title": "Rockwell Automation MicroLogix 1100 and 1400 Unauthorized Access Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/87841"
},
{
"title": "Rockwell Automation MicroLogix 1100 and 1400 Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66882"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-00318"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008008"
},
{
"db": "CNNVD",
"id": "CNNVD-201701-156"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008008"
},
{
"db": "NVD",
"id": "CVE-2016-9334"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-06"
},
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/95302"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9334"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-9334"
},
{
"trust": 0.3,
"url": "http://www.rockwellautomation.com/"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-06 "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-00318"
},
{
"db": "VULHUB",
"id": "VHN-98154"
},
{
"db": "BID",
"id": "95302"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008008"
},
{
"db": "NVD",
"id": "CVE-2016-9334"
},
{
"db": "CNNVD",
"id": "CNNVD-201701-156"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e32f3890-85d5-4037-bb89-489e24febb37"
},
{
"db": "CNVD",
"id": "CNVD-2017-00318"
},
{
"db": "VULHUB",
"id": "VHN-98154"
},
{
"db": "BID",
"id": "95302"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008008"
},
{
"db": "NVD",
"id": "CVE-2016-9334"
},
{
"db": "CNNVD",
"id": "CNNVD-201701-156"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-01-11T00:00:00",
"db": "IVD",
"id": "e32f3890-85d5-4037-bb89-489e24febb37"
},
{
"date": "2017-01-11T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-00318"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-98154"
},
{
"date": "2017-01-05T00:00:00",
"db": "BID",
"id": "95302"
},
{
"date": "2017-04-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008008"
},
{
"date": "2017-02-13T21:59:01.580000",
"db": "NVD",
"id": "CVE-2016-9334"
},
{
"date": "2017-01-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201701-156"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-01-11T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-00318"
},
{
"date": "2017-03-16T00:00:00",
"db": "VULHUB",
"id": "VHN-98154"
},
{
"date": "2017-01-12T01:10:00",
"db": "BID",
"id": "95302"
},
{
"date": "2017-04-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008008"
},
{
"date": "2017-03-16T17:27:53.667000",
"db": "NVD",
"id": "CVE-2016-9334"
},
{
"date": "2017-01-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201701-156"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201701-156"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 Vulnerability in obtaining authentication information in controller",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008008"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201701-156"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.