Rockwell Automation/Allen-Bradley MicroLogix 1400 SNMP Remote Privilege Escalation

high Nessus Network Monitor Plugin ID 70

Synopsis

A vulnerable MicroLogix 1400 programmable logic controller (PLC) has been detected.

Description

Rockwell Automation/Allen-Bradley MicroLogix 1400 programmable logic controllers (PLCs) contain an undocumented, high privileged SNMP community string. This may allow an unauthorized remote attacker to make changes to the device's configuration or update the firmware.

Solution

Currently, there are no known upgrades or patches to correct this vulnerability. It is possible to temporarily mitigate the flaw by implementing the following workaround : - Restrict SNMP access, such as through the use of a firewall, only to authorized access, or - Use the 'RUN' keyswitch setting to prevent unauthorized firmware update operations and configuration changes.

See Also

https://ics-cert.us-cert.gov/advisories/ICSA-16-224-01

Plugin Details

Severity: High

ID: 70

Family: SCADA

Published: 5/21/2019

Updated: 9/30/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:rockwellautomation:ab_micrologix_controller:1400

Patch Publication Date: 8/11/2016

Vulnerability Publication Date: 8/11/2016

Reference Information

CVE: CVE-2016-5645

BID: 92428