Description
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-28128 | Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials. |
References
| Link | Providers |
|---|---|
| https://www.us-cert.gov/ics/advisories/icsa-20-070-06 |
|
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-04T09:18:02.514Z
Reserved: 2020-01-14T00:00:00.000Z
Link: CVE-2020-6988
No data.
Status : Modified
Published: 2020-03-16T16:15:14.767
Modified: 2024-11-21T05:36:26.567
Link: CVE-2020-6988
No data.
OpenCVE Enrichment
No data.
EUVD