Description
An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability.Required Keyswitch State: REMOTE or PROG Associated Fault Code: 0001 Fault Type: Non-User Description: A fault state can be triggered by setting the NVRAM/memory module user program mismatch bit (S2:9) when a memory module is NOT installed.
Published: 2018-04-05
Score: 9.8 Critical
EPSS: 37.0% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Rockwellautomation Micrologix 1400 Micrologix 1400 B Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-09-16T21:57:12.189Z

Reserved: 2017-09-13T00:00:00.000Z

Link: CVE-2017-14464

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-05T21:29:00.633

Modified: 2024-11-21T03:12:50.790

Link: CVE-2017-14464

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses