Description
When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller (Micro800: All versions, MicroLogix 1400: Version 21 and later) causing a denial-of-service condition
Published: 2021-06-03
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-19647 When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller (Micro800: All versions, MicroLogix 1400: Version 21 and later) causing a denial-of-service condition
History

No history.

Subscriptions

Rockwellautomation Micro800 Micro800 Firmware Micrologix 1400 Micrologix 1400 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-03T23:33:55.972Z

Reserved: 2021-05-13T00:00:00.000Z

Link: CVE-2021-32926

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-03T13:15:07.340

Modified: 2024-11-21T06:07:56.463

Link: CVE-2021-32926

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses