Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.

Project Subscriptions

Vendors Products
Rockwellautomation Subscribe
1756-en2f Series A Subscribe
1756-en2f Series A Firmware Subscribe
1756-en2f Series B Subscribe
1756-en2f Series B Firmware Subscribe
1756-en2f Series C Subscribe
1756-en2f Series C Firmware Subscribe
1756-en2t Series A Subscribe
1756-en2t Series A Firmware Subscribe
1756-en2t Series B Subscribe
1756-en2t Series B Firmware Subscribe
1756-en2t Series C Subscribe
1756-en2t Series C Firmware Subscribe
1756-en2t Series D Subscribe
1756-en2t Series D Firmware Subscribe
1756-en2tr Series A Subscribe
1756-en2tr Series A Firmware Subscribe
1756-en2tr Series B Subscribe
1756-en2tr Series B Firmware Subscribe
1756-en2tr Series C Subscribe
1756-en2tr Series C Firmware Subscribe
1756-en3tr Series A Subscribe
1756-en3tr Series A Firmware Subscribe
1756-en3tr Series B Subscribe
1756-en3tr Series B Firmware Subscribe
1756-enbt Subscribe
1756-enbt Firmware Subscribe
1756-eweb Series A Subscribe
1756-eweb Series A Firmware Subscribe
1756-eweb Series B Subscribe
1756-eweb Series B Firmware Subscribe
Micrologix 1400 Subscribe
Micrologix 1400 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2018-9665 Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-05T11:01:14.626Z

Reserved: 2018-10-02T00:00:00

Link: CVE-2018-17924

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-12-07T14:29:00.663

Modified: 2024-11-21T03:55:13.093

Link: CVE-2018-17924

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses