Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-34463 | The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks. |
Solution
No solution given by the vendor.
Workaround
Rockwell Automation encourages those using the affected software to implement the mitigations below to minimize risk. Additionally, Rockwell Automation encourages users to combine risk mitigations with security best practices (also provided below) to deploy a defense-in-depth strategy. Disable the web server where possible (this component is an optional feature and disabling it will not disrupt the intended use of the device). Configure firewalls to disallow network communication through HTTP/Port 80 If applying the mitigations noted above are not possible, please see Rockwell Automation’s Knowledgebase article QA43240 Security Best Practices. For more information, please see the industrial security advisory from Rockwell Automation.
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:14:37.655Z
Reserved: 2022-06-22T00:00:00.000Z
Link: CVE-2022-2179

Updated: 2024-08-03T00:32:07.933Z

Status : Modified
Published: 2022-07-20T16:15:09.030
Modified: 2024-11-21T07:00:29.217
Link: CVE-2022-2179

No data.

No data.