9.3
CVSSv2

CVE-2012-6440

Published: 24/01/2013 Updated: 25/01/2013
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The web-server password-authentication functionality in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and previous versions; CompactLogix 18 and previous versions; GuardLogix 18 and previous versions; SoftLogix 18 and previous versions; CompactLogix controllers 19 and previous versions; SoftLogix controllers 19 and previous versions; ControlLogix controllers 20 and previous versions; GuardLogix controllers 20 and previous versions; and MicroLogix 1100 and 1400 allows man-in-the-middle malicious users to conduct replay attacks via HTTP traffic.

Vulnerable Product Search on Vulmon Subscribe to Product

rockwellautomation 1756-eweb -

rockwellautomation 1768-enbt -

rockwellautomation 1768-eweb -

rockwellautomation compactlogix l35e controller -

rockwellautomation 1756-enbt -

rockwellautomation compactlogix l32e controller -

rockwellautomation 1794-aentr flex i\\/o ethernet\\/ip adapter -

rockwellautomation controllogix controllers

rockwellautomation micrologix

rockwellautomation compactlogix

rockwellautomation guardlogix

rockwellautomation softlogix

rockwellautomation compactlogix controllers

rockwellautomation softlogix controllers

rockwellautomation flexlogix 1788-enbt adapter -

rockwellautomation controllogix

rockwellautomation guardlogix controllers