The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-34463 The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks.
Fixes

Solution

No solution given by the vendor.


Workaround

Rockwell Automation encourages those using the affected software to implement the mitigations below to minimize risk. Additionally, Rockwell Automation encourages users to combine risk mitigations with security best practices (also provided below) to deploy a defense-in-depth strategy. Disable the web server where possible (this component is an optional feature and disabling it will not disrupt the intended use of the device). Configure firewalls to disallow network communication through HTTP/Port 80 If applying the mitigations noted above are not possible, please see Rockwell Automation’s Knowledgebase article QA43240 Security Best Practices. For more information, please see the industrial security advisory from Rockwell Automation.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:14:37.655Z

Reserved: 2022-06-22T00:00:00.000Z

Link: CVE-2022-2179

cve-icon Vulnrichment

Updated: 2024-08-03T00:32:07.933Z

cve-icon NVD

Status : Modified

Published: 2022-07-20T16:15:09.030

Modified: 2024-11-21T07:00:29.217

Link: CVE-2022-2179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.