An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. Because of an Incorrect Permission Assignment for Critical Resource, users with administrator privileges may be able to remove all administrative users requiring a factory reset to restore ancillary web server function. Exploitation of this vulnerability will still allow the affected device to function in its capacity as a controller.

Project Subscriptions

Vendors Products
Rockwellautomation Subscribe
1763-l16awa Series A Subscribe
1763-l16awa Series B Subscribe
1763-l16bbb Series A Subscribe
1763-l16bbb Series B Subscribe
1763-l16bwa Series A Subscribe
1763-l16bwa Series B Subscribe
1763-l16dwd Series A Subscribe
1763-l16dwd Series B Subscribe
1766-l32awa Series A Subscribe
1766-l32awa Series B Subscribe
1766-l32awaa Series A Subscribe
1766-l32awaa Series B Subscribe
1766-l32bwa Series A Subscribe
1766-l32bwa Series B Subscribe
1766-l32bwaa Series A Subscribe
1766-l32bwaa Series B Subscribe
1766-l32bxb Series A Subscribe
1766-l32bxb Series B Subscribe
1766-l32bxba Series A Subscribe
1766-l32bxba Series B Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2016-10148 An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. Because of an Incorrect Permission Assignment for Critical Resource, users with administrator privileges may be able to remove all administrative users requiring a factory reset to restore ancillary web server function. Exploitation of this vulnerability will still allow the affected device to function in its capacity as a controller.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-06T02:50:36.961Z

Reserved: 2016-11-16T00:00:00

Link: CVE-2016-9338

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-02-13T21:59:01.627

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-9338

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses