Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Rockwellautomation
Subscribe
|
1756-en2f Series A
Subscribe
1756-en2f Series A Firmware
Subscribe
1756-en2f Series B
Subscribe
1756-en2f Series B Firmware
Subscribe
1756-en2f Series C
Subscribe
1756-en2f Series C Firmware
Subscribe
1756-en2t Series A
Subscribe
1756-en2t Series A Firmware
Subscribe
1756-en2t Series B
Subscribe
1756-en2t Series B Firmware
Subscribe
1756-en2t Series C
Subscribe
1756-en2t Series C Firmware
Subscribe
1756-en2t Series D
Subscribe
1756-en2t Series D Firmware
Subscribe
1756-en2tr Series A
Subscribe
1756-en2tr Series A Firmware
Subscribe
1756-en2tr Series B
Subscribe
1756-en2tr Series B Firmware
Subscribe
1756-en2tr Series C
Subscribe
1756-en2tr Series C Firmware
Subscribe
1756-en3tr Series A
Subscribe
1756-en3tr Series A Firmware
Subscribe
1756-en3tr Series B
Subscribe
1756-en3tr Series B Firmware
Subscribe
1756-enbt
Subscribe
1756-enbt Firmware
Subscribe
1756-eweb Series A
Subscribe
1756-eweb Series A Firmware
Subscribe
1756-eweb Series B
Subscribe
1756-eweb Series B Firmware
Subscribe
Micrologix 1400
Subscribe
Micrologix 1400 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-9665 | Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-05T11:01:14.626Z
Reserved: 2018-10-02T00:00:00
Link: CVE-2018-17924
No data.
Status : Modified
Published: 2018-12-07T14:29:00.663
Modified: 2024-11-21T03:55:13.093
Link: CVE-2018-17924
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD