2024-12-08 03:06:42 +00:00

185 lines
7.5 KiB
JSON

{
"id": "CVE-2012-6441",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2013-01-24T21:55:01.727",
"lastModified": "2024-11-21T01:46:08.013",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to obtain sensitive information via a crafted CIP packet."
},
{
"lang": "es",
"value": "Los productos Rockwell Automation EtherNet/IP: m\u00f3dulos de comunicaci\u00f3n 1756-ENBT, 1756-EWEB, 1768-ENBT, y 1768-EWEB; controladores CompactLogix L32E y L35E; adaptador 1788-ENBT FLEXLogix; adaptador 1794-AENTR FLEX I/O EtherNet/IP; ControlLogix 18 y anteriores; CompactLogix 18 y anteriores; GuardLogix 18 y anteriores; SoftLogix 18 y anteriores; controlador CompactLogix 19 y anteriores; controladores SoftLogix 19 y anteriores; controladores ControlLogix 20 y anteriores; controladores GuardLogix 20 y anteriores; MicroLogix 1100 y 1400 permiten a atacantes remotos obtener informaci\u00f3n sensible por paquetes CIP manipulados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:controllogix_controllers:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20",
"matchCriteriaId": "37F4D4ED-1915-4155-9F0A-691771AA534B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:guardlogix_controllers:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20",
"matchCriteriaId": "A2F8B5EE-C1BA-4CFB-B17F-C59BCDB41503"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1100",
"matchCriteriaId": "DE554CCC-0A46-43D4-8D7D-44200BB7D314"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1400",
"matchCriteriaId": "8D3B4218-4483-4FAE-9915-8937F40AED27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:softlogix_controllers:*:*:*:*:*:*:*:*",
"versionEndIncluding": "19",
"matchCriteriaId": "FE7219A5-4759-4143-B89F-869D49CAAFF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:1756-enbt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "330E9A05-C869-41B1-BB28-FD2A7C7ED0CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:1756-eweb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD7D5DB-4A49-421A-8C6C-B9E6DA0A499B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:1768-enbt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD44B55C-BDD7-41CC-91A9-F31ED2FC69E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:1768-eweb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C91D5245-DED2-469C-A800-62109F8159C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:1794-aentr_flex_i\\/o_ethernet\\/ip_adapter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD25E6B-6AE1-4B8C-A086-F5E152CAAA60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:compactlogix:*:*:*:*:*:*:*:*",
"versionEndIncluding": "18",
"matchCriteriaId": "AA199887-E8F7-48EE-B1E0-9EF2E439DACE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:compactlogix_controllers:*:*:*:*:*:*:*:*",
"versionEndIncluding": "19",
"matchCriteriaId": "A763D845-B091-47A4-8A29-A1CD19C1E4F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:compactlogix_l32e_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19B8ED27-2512-4A42-973C-99D300963046"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:compactlogix_l35e_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EFC590C-01C1-48D1-A5BE-0F70BE7F36B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:controllogix:*:*:*:*:*:*:*:*",
"versionEndIncluding": "18",
"matchCriteriaId": "4FE24B9B-9F7D-4D8F-A674-F04FC9F9F8BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:flexlogix_1788-enbt_adapter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "887A3369-548C-42B0-82C5-92CB161D3B7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:guardlogix:*:*:*:*:*:*:*:*",
"versionEndIncluding": "18",
"matchCriteriaId": "E98626DD-BC79-473E-B25F-92C9BA12F6DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:rockwellautomation:softlogix:*:*:*:*:*:*:*:*",
"versionEndIncluding": "18",
"matchCriteriaId": "D83AF504-2845-4022-BA8E-52F4FB773EA4"
}
]
}
]
}
],
"references": [
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
}
]
}