Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2012-6439

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-24 Jan, 2013 | 21:00
Updated At-30 Jun, 2025 | 21:33
Rejected At-
Credits

Rockwell Automation ControlLogix PLC Improper Access Control

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that changes the product’s configuration and network parameters, a DoS condition can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.  Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:24 Jan, 2013 | 21:00
Updated At:30 Jun, 2025 | 21:33
Rejected At:
▼CVE Numbering Authority (CNA)
Rockwell Automation ControlLogix PLC Improper Access Control

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that changes the product’s configuration and network parameters, a DoS condition can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.  Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Affected Products
Vendor
Rockwell Automation, Inc.Rockwell Automation
Product
1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modules
Default Status
unaffected
Versions
Affected
  • All
Vendor
Rockwell Automation, Inc.Rockwell Automation
Product
CompactLogix L32E and L35E controllers
Default Status
unaffected
Versions
Affected
  • All
Vendor
Rockwell Automation, Inc.Rockwell Automation
Product
1788-ENBT FLEXLogix adapter
Default Status
unaffected
Versions
Affected
  • All
Vendor
Rockwell Automation, Inc.Rockwell Automation
Product
1794-AENTR FLEX I/O EtherNet/IP adapter
Default Status
unaffected
Versions
Affected
  • All
Vendor
Rockwell Automation, Inc.Rockwell Automation
Product
ControlLogix, CompactLogix, GuardLogix, and SoftLogix
Default Status
unaffected
Versions
Affected
  • From 0 through 18 (custom)
Vendor
Rockwell Automation, Inc.Rockwell Automation
Product
CompactLogix and SoftLogix controllers
Default Status
unaffected
Versions
Affected
  • From 0 through 19 (custom)
Vendor
Rockwell Automation, Inc.Rockwell Automation
Product
ControlLogix and GuardLogix controllers
Default Status
unaffected
Versions
Affected
  • From 0 through 20 (custom)
Vendor
Rockwell Automation, Inc.Rockwell Automation
Product
MicroLogix
Default Status
unaffected
Versions
Affected
  • 1100
  • 1400
Problem Types
TypeCWE IDDescription
CWECWE-284CWE-284
Type: CWE
CWE ID: CWE-284
Description: CWE-284
Metrics
VersionBase scoreBase severityVector
2.08.5N/A
AV:N/AC:L/Au:N/C:N/I:P/A:C
Version: 2.0
Base score: 8.5
Base severity: N/A
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

According to Rockwell, any of the above products that become affected by a vulnerability can be reset by rebooting or power cycling the affected product. After the reboot, the affected product may require some reconfiguration. To mitigate the vulnerabilities, Rockwell has developed and released security patches on July 18, 2012, to address each of the issues. To download and install the patches please refer to Rockwell’s Advisories at: https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154 https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155 https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156 For more information on security with Rockwell Automation products, please refer to Rockwell’s Security Advisory Index http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102 .

Configurations

Workarounds

Rockwell recommends updating to the newest firmware patches to fix the vulnerabilities, but if not able to do so right away, then Rockwell advises immediately employing the following mitigations for each of the affected products. To mitigate the vulnerabilities pertaining to receiving valid CIP packets: * Block all traffic to the Ethernet/IP or other CIP protocol-based devices from outside the Manufacturing Zone by restricting or blocking access to TCP and UDP Ports 2222 and 44818 using appropriate security technology such as a firewall or Unified Threat Management (UTM). * Employ a UTM appliance that specifically supports CIP message filtering. In addition to the above, Rockwell recommends concerned customers remain vigilant and continue to follow security strategies that help reduce risk and enhance overall control system security. Where possible, they suggest you apply multiple recommendations and complement this list with your own best-practices: * Employ layered security and defense-in-depth methods in system design to restrict and control access to individual products and control networks. Refer to http://www.ab.com/networks/architectures.html for comprehensive information about implementing validated architectures designed to deliver these measures. * Restrict physical and electronic access to automation products, networks, and systems to only those individuals authorized to be in contact with control system equipment. * Employ firewalls with ingress/egress filtering, intrusion detection/prevention systems, and validate all configurations. Evaluate firewall configurations to ensure other appropriate inbound and outbound traffic is blocked. * Use up-to-date end-point protection software (e.g., antivirus/antimalware software) on all PC-based assets. * Make sure that software and control system device firmware is patched to current releases. * Periodically change passwords in control system components and infrastructure devices. * Where applicable, set the controller key-switch/mode-switch to RUN mode. For more information on security with Rockwell Automation products, please refer to Rockwell’s Security Advisory Index http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102 .

Exploits

Credits

finder
Rubén Santamarta of IOActive identified vulnerabilities in Rockwell Automation’s ControlLogix PLC and released proof-of-concept (exploit) code at the Digital Bond S4 Conference on January 19, 2012.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf
x_refsource_MISC
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154
N/A
https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155
N/A
https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156
N/A
http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102
N/A
Hyperlink: http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf
Resource:
x_refsource_MISC
Hyperlink: https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154
Resource: N/A
Hyperlink: https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155
Resource: N/A
Hyperlink: https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156
Resource: N/A
Hyperlink: http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf
x_refsource_MISC
x_transferred
Hyperlink: http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:24 Jan, 2013 | 21:55
Updated At:30 Jun, 2025 | 22:15

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that changes the product’s configuration and network parameters, a DoS condition can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.  Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary2.08.5HIGH
AV:N/AC:L/Au:N/C:N/I:P/A:C
Primary2.08.5HIGH
AV:N/AC:L/Au:N/C:N/I:P/A:C
Type: Secondary
Version: 2.0
Base score: 8.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:C
Type: Primary
Version: 2.0
Base score: 8.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:C
CPE Matches

Rockwell Automation, Inc.
rockwellautomation
>>controllogix_controllers>>Versions up to 20(inclusive)
cpe:2.3:a:rockwellautomation:controllogix_controllers:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>guardlogix_controllers>>Versions up to 20(inclusive)
cpe:2.3:a:rockwellautomation:guardlogix_controllers:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>micrologix>>Versions up to 1100(inclusive)
cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>micrologix>>Versions up to 1400(inclusive)
cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>softlogix_controllers>>Versions up to 19(inclusive)
cpe:2.3:a:rockwellautomation:softlogix_controllers:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>1756-enbt>>-
cpe:2.3:h:rockwellautomation:1756-enbt:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>1756-eweb>>-
cpe:2.3:h:rockwellautomation:1756-eweb:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>1768-enbt>>-
cpe:2.3:h:rockwellautomation:1768-enbt:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>1768-eweb>>-
cpe:2.3:h:rockwellautomation:1768-eweb:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>1794-aentr_flex_i\/o_ethernet\/ip_adapter>>-
cpe:2.3:h:rockwellautomation:1794-aentr_flex_i\/o_ethernet\/ip_adapter:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>compactlogix>>Versions up to 18(inclusive)
cpe:2.3:h:rockwellautomation:compactlogix:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>compactlogix_controllers>>Versions up to 19(inclusive)
cpe:2.3:h:rockwellautomation:compactlogix_controllers:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>compactlogix_l32e_controller>>-
cpe:2.3:h:rockwellautomation:compactlogix_l32e_controller:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>compactlogix_l35e_controller>>-
cpe:2.3:h:rockwellautomation:compactlogix_l35e_controller:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>controllogix>>Versions up to 18(inclusive)
cpe:2.3:h:rockwellautomation:controllogix:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>flexlogix_1788-enbt_adapter>>-
cpe:2.3:h:rockwellautomation:flexlogix_1788-enbt_adapter:-:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>guardlogix>>Versions up to 18(inclusive)
cpe:2.3:h:rockwellautomation:guardlogix:*:*:*:*:*:*:*:*
Rockwell Automation, Inc.
rockwellautomation
>>softlogix>>Versions up to 18(inclusive)
cpe:2.3:h:rockwellautomation:softlogix:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-284Primaryics-cert@hq.dhs.gov
NVD-CWE-OtherSecondarynvd@nist.gov
CWE ID: CWE-284
Type: Primary
Source: ics-cert@hq.dhs.gov
CWE ID: NVD-CWE-Other
Type: Secondary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102ics-cert@hq.dhs.gov
N/A
http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdfics-cert@hq.dhs.gov
US Government Resource
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154ics-cert@hq.dhs.gov
N/A
https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155ics-cert@hq.dhs.gov
N/A
https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156ics-cert@hq.dhs.gov
N/A
http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdfaf854a3a-2127-422b-91ae-364da2661108
US Government Resource
Hyperlink: http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf
Source: ics-cert@hq.dhs.gov
Resource:
US Government Resource
Hyperlink: https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
US Government Resource

Change History

0
Information is not available yet

Similar CVEs

10Records found

CVE-2010-5305
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-1.41% / 79.75%
||
7 Day CHG~0.00%
Published-26 Mar, 2019 | 17:24
Updated-26 Jun, 2025 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell PLC5/SLC5/0x/RSLogix Credentials management

The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product’s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-rslogixplc5_1785-lx_firmwareslc5\/01_1747-l5xplc5_1785-lxslc5\/01_1747-l5x_firmwareRSLogixSLC5/0xPLC5
CWE ID-CWE-284
Improper Access Control
CVE-2016-2277
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.3||MEDIUM
EPSS-0.01% / 0.67%
||
7 Day CHG~0.00%
Published-06 Apr, 2016 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IAB.exe in Rockwell Automation Integrated Architecture Builder (IAB) before 9.6.0.8 and 9.7.x before 9.7.0.2 allows remote attackers to execute arbitrary code via a crafted project file.

Action-Not Available
Vendor-n/aRockwell Automation, Inc.
Product-integrated_architecture_buildern/a
CWE ID-CWE-284
Improper Access Control
CVE-2023-1834
Matching Score-6
Assigner-Rockwell Automation
ShareView Details
Matching Score-6
Assigner-Rockwell Automation
CVSS Score-9.4||CRITICAL
EPSS-0.24% / 47.20%
||
7 Day CHG~0.00%
Published-11 May, 2023 | 18:01
Updated-24 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Kinetix 5500 Vulnerable to Open Port Exploitation

Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running v7.13 may have the telnet and FTP ports open by default.  This could potentially allow attackers unauthorized access to the device through the open ports.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-kinetix_5500_firmwarekinetix_5500Kinetix 5500 EtherNet/IP Servo Drive
CWE ID-CWE-284
Improper Access Control
CVE-2012-6435
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-24.22% / 95.86%
||
7 Day CHG~0.00%
Published-24 Jan, 2013 | 21:00
Updated-30 Jun, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation ControlLogix PLC Improper Access Control

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the CPU to stop logic execution and enter a fault state, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-micrologixcompactlogix_l35e_controllercompactlogix_l32e_controllersoftlogix_controllerssoftlogix1794-aentr_flex_i\/o_ethernet\/ip_adaptercontrollogix_controllersguardlogix1768-ewebcompactlogix_controllerscontrollogixguardlogix_controllerscompactlogixflexlogix_1788-enbt_adapter1768-enbt1756-eweb1756-enbt1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modulesCompactLogix and SoftLogix controllers1788-ENBT FLEXLogix adapterControlLogix and GuardLogix controllersControlLogix, CompactLogix, GuardLogix, and SoftLogixCompactLogix L32E and L35E controllers1794-AENTR FLEX I/O EtherNet/IP adapterMicroLogix
CWE ID-CWE-284
Improper Access Control
CVE-2016-5645
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-7.3||HIGH
EPSS-30.31% / 96.52%
||
7 Day CHG~0.00%
Published-24 Aug, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Rockwell Automation MicroLogix 1400 PLC 1766-L32BWA, 1766-L32AWA, 1766-L32BXB, 1766-L32BWAA, 1766-L32AWAA, and 1766-L32BXBA devices have a hardcoded SNMP community, which makes it easier for remote attackers to load arbitrary firmware updates by leveraging knowledge of this community.

Action-Not Available
Vendor-n/aRockwell Automation, Inc.
Product-1766-l32bwaa1766-l32bxb1766-l32awa1766-l32bxba1766-l32awaa1766-l32bwan/a
CWE ID-CWE-284
Improper Access Control
CVE-2019-10970
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 8.48%
||
7 Day CHG~0.00%
Published-11 Jul, 2019 | 19:51
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Rockwell Automation PanelView 5510 (all versions manufactured before March 13, 2019 that have never been updated to v4.003, v5.002, or later), a remote, unauthenticated threat actor with access to an affected PanelView 5510 Graphic Display, upon successful exploit, may boot-up the terminal and gain root-level access to the device’s file system.

Action-Not Available
Vendor-n/aRockwell Automation, Inc.
Product-panelview_5510panelview_5510_firmwareRockwell Automation PanelView 5510
CWE ID-CWE-284
Improper Access Control
CVE-2022-38743
Matching Score-6
Assigner-Rockwell Automation
ShareView Details
Matching Score-6
Assigner-Rockwell Automation
CVSS Score-8.8||HIGH
EPSS-0.04% / 9.72%
||
7 Day CHG~0.00%
Published-17 Oct, 2022 | 00:00
Updated-13 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to an improper access control vulnerability. The FactoryTalk VantagePoint SQL Server account could allow a malicious user with read-only privileges to execute SQL statements in the back-end database. If successfully exploited, this could allow the attacker to execute arbitrary code and gain access to restricted data.

Action-Not Available
Vendor-n/aRockwell Automation, Inc.
Product-factorytalk_vantagepointFactoryTalk VantagePoint
CWE ID-CWE-284
Improper Access Control
CVE-2020-14504
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 45.68%
||
7 Day CHG~0.00%
Published-24 Feb, 2022 | 18:26
Updated-17 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web interface of the 1734-AENTR communication module mishandles authentication for HTTP POST requests. A remote, unauthenticated attacker can send a crafted request that may allow for modification of the configuration settings.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-1734-aentr_point_i\/o_dual_port_network_adaptor_series_b1734-aentr_point_i\/o_dual_port_network_adaptor_series_c_firmware1734-aentr_point_i\/o_dual_port_network_adaptor_series_b_firmware1734-aentr_point_i\/o_dual_port_network_adaptor_series_c1734-AENTR
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2012-6442
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-18.39% / 94.98%
||
7 Day CHG~0.00%
Published-24 Jan, 2013 | 21:00
Updated-30 Jun, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation ControlLogix PLC Improper Access Control

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the product to reset, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-flex_i\/o_ethernet\/ip__firmwareguardlogix_firmware1400controllogix_controllers_firmwareguardlogix_controllers_firmwarecompactlogix_controllers_firmwarel35econtrollogix_firmware1794-aentrethernet\/ip_firmware1100micrologix_firmware1768-ewebcompactlogix_firmwaresoftlogix_firmware1788-enbtsoftlogix_controllers_firmware1768-enbt1756-eweb1756-enbtl32eflexlogix_firmware1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modulesCompactLogix and SoftLogix controllers1788-ENBT FLEXLogix adapterControlLogix and GuardLogix controllersControlLogix, CompactLogix, GuardLogix, and SoftLogixCompactLogix L32E and L35E controllers1794-AENTR FLEX I/O EtherNet/IP adapterMicroLogix
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-284
Improper Access Control
CVE-2018-19945
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.40% / 59.80%
||
7 Day CHG~0.00%
Published-31 Dec, 2020 | 16:33
Updated-17 Sep, 2024 | 02:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Limitation of a Pathname to a Restricted Directory in QTS

A vulnerability has been reported to affect earlier QNAP devices running QTS 4.3.4 to 4.3.6. Caused by improper limitations of a pathname to a restricted directory, this vulnerability allows for renaming arbitrary files on the target system, if exploited. QNAP have already fixed this vulnerability in the following versions: QTS 4.3.6.0895 build 20190328 (and later) QTS 4.3.4.0899 build 20190322 (and later) This issue does not affect QTS 4.4.x or QTS 4.5.x.

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qtsQTS
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-73
External Control of File Name or Path
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-20
Improper Input Validation
Details not found