Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Micrologix_1400_firmware
(Rockwellautomation)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 11 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-03-25 | CVE-2021-22659 | Rockwell Automation MicroLogix 1400 Version 21.6 and below may allow a remote unauthenticated attacker to send a specially crafted Modbus packet allowing the attacker to retrieve or modify random values in the register. If successfully exploited, this may lead to a buffer overflow resulting in a denial-of-service condition. The FAULT LED will flash RED and communications may be lost. Recovery from denial-of-service condition requires the fault to be cleared by the user. | Micrologix_1400_firmware | 8.6 | ||
2021-06-03 | CVE-2021-32926 | When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller (Micro800: All versions, MicroLogix 1400: Version 21 and later) causing a denial-of-service condition | Micro800_firmware, Micrologix_1400_firmware | 7.5 | ||
2022-07-20 | CVE-2022-2179 | The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks. | Micrologix_1100_firmware, Micrologix_1400_firmware | 6.5 | ||
2022-12-16 | CVE-2022-3166 | Rockwell Automation was made aware that the webservers of the Micrologix 1100 and 1400 controllers contain a vulnerability that may lead to a denial-of-service condition. The security vulnerability could be exploited by an attacker with network access to the affected systems by sending TCP packets to webserver and closing it abruptly which would cause a denial-of-service condition for the web server application on the device | Micrologix_1100_firmware, Micrologix_1400_firmware | 7.5 | ||
2022-12-16 | CVE-2022-46670 | Rockwell Automation was made aware of a vulnerability by a security researcher from Georgia Institute of Technology that the MicroLogix 1100 and 1400 controllers contain a vulnerability that may give an attacker the ability to accomplish remote code execution. The vulnerability is an unauthenticated stored cross-site scripting vulnerability in the embedded webserver. The payload is transferred to the controller over SNMP and is rendered on the homepage of the embedded website. | Micrologix_1100_firmware, Micrologix_1400\-A_firmware, Micrologix_1400\-B_firmware, Micrologix_1400\-C_firmware, Micrologix_1400_firmware | 6.1 | ||
2018-12-07 | CVE-2018-17924 | Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic... | 1756\-En2f_series_a_firmware, 1756\-En2f_series_b_firmware, 1756\-En2f_series_c_firmware, 1756\-En2t_series_a_firmware, 1756\-En2t_series_b_firmware, 1756\-En2t_series_c_firmware, 1756\-En2t_series_d_firmware, 1756\-En2tr_series_a_firmware, 1756\-En2tr_series_b_firmware, 1756\-En2tr_series_c_firmware, 1756\-En3tr_series_a_firmware, 1756\-En3tr_series_b_firmware, 1756\-Enbt_firmware, 1756\-Eweb_series_a_firmware, 1756\-Eweb_series_b_firmware, Micrologix_1400_firmware | 8.6 | ||
2015-10-28 | CVE-2015-6492 | Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allow remote attackers to cause a denial of service (memory corruption and device crash) via a crafted HTTP request. | Micrologix_1100_firmware, Micrologix_1400_firmware | N/A | ||
2015-10-28 | CVE-2015-6491 | Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allow remote authenticated users to insert the content of an arbitrary file into a FRAME element via unspecified vectors. | Micrologix_1100_firmware, Micrologix_1400_firmware | N/A | ||
2015-10-28 | CVE-2015-6490 | Stack-based buffer overflow on Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices through B FRN 15.003 allows remote attackers to execute arbitrary code via unspecified vectors. | Micrologix_1100_firmware, Micrologix_1400_firmware | N/A | ||
2015-10-28 | CVE-2015-6488 | Cross-site scripting (XSS) vulnerability in the web server on Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | Micrologix_1100_firmware, Micrologix_1400_firmware | N/A |