Allen Bradley Micrologix 1400 Series におけるアクセス制御に関する脆弱性
| Title |
Allen Bradley Micrologix 1400 Series におけるアクセス制御に関する脆弱性
|
| Summary |
Allen Bradley Micrologix 1400 Series には、アクセス制御に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
Sept. 13, 2017, midnight |
| Registration Date |
June 6, 2018, 5:13 p.m. |
| Last Update |
June 6, 2018, 5:13 p.m. |
|
CVSS3.0 : 緊急
|
| Score |
9.8
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
7.5
|
| Vector |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
Affected System
| Rockwell Automation |
|
MicroLogix 1400 ファームウェア B FRN 21.2 およびそれ以前
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年06月06日] 掲載 |
June 6, 2018, 5:13 p.m. |
NVD Vulnerability Information
CVE-2017-14468
| Summary |
An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG Description: This ability is leveraged in a larger exploit to flash custom firmware.
|
| Publication Date |
April 6, 2018, 6:29 a.m. |
| Registration Date |
Jan. 26, 2021, 1:15 p.m. |
| Last Update |
Nov. 21, 2024, 12:12 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:rockwellautomation:micrologix_1400_b_firmware:*:*:*:*:*:*:*:* |
|
21.2 |
|
|
| execution environment |
| 1 |
cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:* |
Related information, measures and tools
Common Vulnerabilities List