5
CVSSv2

CVE-2020-6988

Published: 16/03/2020 Updated: 20/03/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an malicious user to bypass authentication altogether, disclose sensitive information, or leak credentials.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rockwellautomation micrologix_1400_a_firmware

rockwellautomation micrologix_1400_b_firmware

rockwellautomation micrologix_1100_firmware

rockwellautomation rslogix 500