Rockwell Automation/Allen-Bradley MicroLogix 1400 Series B FRN < 21.2 Authentication Bypass

high Nessus Network Monitor Plugin ID 720101

Synopsis

An exploitable file write vulnerability exists in the memory module functionality of the Allen Bradley Micrologix 1400 controller.

Description

An exploitable file write vulnerability exists in the memory module functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a file write resulting in a new program being written to the memory module. An attacker can send an unauthenticated packet to trigger this vulnerability.

Solution

Perform vendor recommended mitigations and apply available vendor upgrades.

See Also

https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0444,https://ics-cert.us-cert.gov/advisories/ICSA-18-095-01

Plugin Details

Severity: High

ID: 720101

Family: SCADA

Published: 5/8/2019

Updated: 9/30/2019

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Vulnerability Information

Patch Publication Date: 4/5/2018

Vulnerability Publication Date: 4/5/2018

Reference Information

CVE: CVE-2017-12092