Description
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic key utilized to help protect the account password is hard coded into the RSLogix 500 binary file. An attacker could identify cryptographic keys and use it for further cryptographic attacks that could ultimately lead to a remote attacker gaining unauthorized access to the controller.
Published: 2020-03-16
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-28130 Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic key utilized to help protect the account password is hard coded into the RSLogix 500 binary file. An attacker could identify cryptographic keys and use it for further cryptographic attacks that could ultimately lead to a remote attacker gaining unauthorized access to the controller.
History

No history.

Subscriptions

Rockwellautomation Micrologix 1100 Micrologix 1100 Firmware Micrologix 1400 Micrologix 1400 A Firmware Micrologix 1400 B Firmware Rslogix 500
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-04T09:18:02.522Z

Reserved: 2020-01-14T00:00:00.000Z

Link: CVE-2020-6990

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-03-16T16:15:14.843

Modified: 2024-11-21T05:36:26.807

Link: CVE-2020-6990

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses