2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2012-6438" ,
"sourceIdentifier" : "ics-cert@hq.dhs.gov" ,
"published" : "2013-01-24T21:55:01.603" ,
2024-11-22 19:15:24 +00:00
"lastModified" : "2024-11-21T01:46:07.650" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Buffer overflow in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows remote attackers to cause a denial of service (NIC crash and communication outage) via a malformed CIP packet."
} ,
{
"lang" : "es" ,
"value" : "Desbordamiento de b\u00fafer en Rockwell Automation EtherNet/IP; productos 1756-ENBT, 1756-EWEB, 1768-ENBT y m\u00f3dulos de comunicaci\u00f3n 1768-EWEB; CompactLogix L32E y L35E, 1788-ENBT adaptador FlexLogix; AENTR 1794-FLEX adaptador I/O EtherNet/IP; ControlLogix v18 y anteriores; CompactLogix v18 y anteriores; GuardLogix v18 y anteriores; SoftLogix v18 y anteriores; controladores CompactLogix v19 y anteriores; controladores SoftLogix v19 y anteriores; controladores ControlLogix v20 y anteriores, los controladores GuardLogix v20 y anteriores, y MicroLogix 1100 y 1400, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda NIC y corte de la comunicaci\u00f3n) a trav\u00e9s de un paquete mal formado CIP."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
2024-11-22 19:15:24 +00:00
"baseScore" : 7.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-22 19:15:24 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:rockwellautomation:controllogix_controllers:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "20" ,
"matchCriteriaId" : "37F4D4ED-1915-4155-9F0A-691771AA534B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:rockwellautomation:guardlogix_controllers:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "20" ,
"matchCriteriaId" : "A2F8B5EE-C1BA-4CFB-B17F-C59BCDB41503"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1100" ,
"matchCriteriaId" : "DE554CCC-0A46-43D4-8D7D-44200BB7D314"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1400" ,
"matchCriteriaId" : "8D3B4218-4483-4FAE-9915-8937F40AED27"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:rockwellautomation:softlogix_controllers:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "19" ,
"matchCriteriaId" : "FE7219A5-4759-4143-B89F-869D49CAAFF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:1756-enbt:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "330E9A05-C869-41B1-BB28-FD2A7C7ED0CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:1756-eweb:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2AD7D5DB-4A49-421A-8C6C-B9E6DA0A499B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:1768-enbt:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD44B55C-BDD7-41CC-91A9-F31ED2FC69E2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:1768-eweb:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C91D5245-DED2-469C-A800-62109F8159C9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:1794-aentr_flex_i\\/o_ethernet\\/ip_adapter:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0BD25E6B-6AE1-4B8C-A086-F5E152CAAA60"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:compactlogix:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "18" ,
"matchCriteriaId" : "AA199887-E8F7-48EE-B1E0-9EF2E439DACE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:compactlogix_controllers:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "19" ,
"matchCriteriaId" : "A763D845-B091-47A4-8A29-A1CD19C1E4F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:compactlogix_l32e_controller:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "19B8ED27-2512-4A42-973C-99D300963046"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:compactlogix_l35e_controller:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7EFC590C-01C1-48D1-A5BE-0F70BE7F36B9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:controllogix:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "18" ,
"matchCriteriaId" : "4FE24B9B-9F7D-4D8F-A674-F04FC9F9F8BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:flexlogix_1788-enbt_adapter:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "887A3369-548C-42B0-82C5-92CB161D3B7A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:guardlogix:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "18" ,
"matchCriteriaId" : "E98626DD-BC79-473E-B25F-92C9BA12F6DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:rockwellautomation:softlogix:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "18" ,
"matchCriteriaId" : "D83AF504-2845-4022-BA8E-52F4FB773EA4"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf" ,
"source" : "ics-cert@hq.dhs.gov" ,
"tags" : [
"US Government Resource"
]
2024-11-22 19:15:24 +00:00
} ,
{
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"US Government Resource"
]
2023-04-24 12:24:31 +02:00
}
]
}