CVE-2017-14464

An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability.Required Keyswitch State: REMOTE or PROG Associated Fault Code: 0001 Fault Type: Non-User Description: A fault state can be triggered by setting the NVRAM/memory module user program mismatch bit (S2:9) when a memory module is NOT installed.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:rockwellautomation:micrologix_1400_b_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:12

Type Values Removed Values Added
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 - Exploit, Third Party Advisory () https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 - Exploit, Third Party Advisory

Information

Published : 2018-04-05 21:29

Updated : 2024-11-21 03:12


NVD link : CVE-2017-14464

Mitre link : CVE-2017-14464

CVE.ORG link : CVE-2017-14464


JSON object : View

Products Affected

rockwellautomation

  • micrologix_1400
  • micrologix_1400_b_firmware