MicroLogix 1400 PLC Web Server Multiple Vulnerabilities

high Nessus Plugin ID 91384

Synopsis

The remote programmable logic controller (PLC) device is affected by multiple vulnerabilities.

Description

The firmware installed on the remote Allen-Bradley MicroLogix 1400 PLC device is a version prior to 15.003. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists due to improper sanitization of user-supplied input before using it in SQL queries. An authenticated, remote attacker can exploit this to inject SQL queries against the back-end database, resulting in the manipulation or disclosure of arbitrary data. (CVE-2015-6486)

- A cross-site scripting (XSS) vulnerability exists due to improper validation of input before returning it to users. An unauthenticated, remote attacker can exploit this, via a crafted request, to execute arbitrary script code in the user's browser session. (CVE-2015-6488)

- A flaw exists due to improper sanitization of user-supplied input before returning it to users. An authenticated, remote attacker can exploit this to insert into a FRAME element the content of an include file from a remote host, resulting in the execution of arbitrary commands or code with the same privileges as the web server. (CVE-2015-6491)

- A memory corruption issue exists that allows an unauthenticated, remote attacker, via a crafted HTTP request, to crash the device, resulting in a denial of service condition. (CVE-2015-6492)

Solution

Upgrade to the latest firmware version. Alternatively, block all ports from external networks. See the vendor for further details.

See Also

https://ics-cert.us-cert.gov/advisories/ICSA-15-300-03A

https://ics-cert.us-cert.gov/alerts/ICS-ALERT-15-225-02A

http://www.nessus.org/u?e8ec3436

Plugin Details

Severity: High

ID: 91384

File Name: scada_RA_76325_1400.nbin

Version: 1.81

Type: remote

Family: SCADA

Published: 5/31/2016

Updated: 7/17/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2015-6486

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:rockwellautomation:ab_micrologix_controller:1400

Required KB Items: www/80/Rockwell Automation MicroLogix 1400 PLC Web Server/version, www/80/Rockwell Automation MicroLogix 1400 PLC Web Server/name, www/80/Rockwell Automation MicroLogix 1400 PLC Web Server/os

Exploit Ease: No known exploits are available

Patch Publication Date: 10/2/2015

Vulnerability Publication Date: 10/26/2015

Reference Information

CVE: CVE-2015-6486, CVE-2015-6488, CVE-2015-6491, CVE-2015-6492

BID: 76357, 77333