ID
VAR-E-201301-0013
CVE
cve_id: | CVE-2012-6436 | Trust: 0.3 |
cve_id: | CVE-2012-6438 | Trust: 0.3 |
cve_id: | CVE-2012-6437 | Trust: 0.3 |
cve_id: | CVE-2012-6440 | Trust: 0.3 |
TITLE
Rockwell Automation ControlLogix CVE-2012-6436 Remote Denial of Service Vulnerability
Trust: 1.2
DESCRIPTION
Rockwell Automation ControlLogix is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause the NIC to crash, denying service to legitimate users.
Trust: 1.2
AFFECTED PRODUCTS
vendor: | rockwell | model: | automation softlogix | scope: | eq | version: | 19 | Trust: 1.2 |
vendor: | rockwell | model: | automation softlogix | scope: | eq | version: | 18 | Trust: 1.2 |
vendor: | rockwell | model: | automation micrologix | scope: | eq | version: | 14000 | Trust: 1.2 |
vendor: | rockwell | model: | automation micrologix | scope: | eq | version: | 11000 | Trust: 1.2 |
vendor: | rockwell | model: | automation guardlogix | scope: | eq | version: | 20 | Trust: 1.2 |
vendor: | rockwell | model: | automation guardlogix | scope: | eq | version: | 18 | Trust: 1.2 |
vendor: | rockwell | model: | automation compactlogix l35e | scope: | - | version: | - | Trust: 1.2 |
vendor: | rockwell | model: | automation compactlogix l32e | scope: | - | version: | - | Trust: 1.2 |
vendor: | rockwell | model: | automation compactlogix | scope: | eq | version: | 19 | Trust: 1.2 |
vendor: | rockwell | model: | automation compactlogix | scope: | eq | version: | 18 | Trust: 1.2 |
vendor: | rockwell | model: | automation 1794-aentr | scope: | eq | version: | 0 | Trust: 1.2 |
vendor: | rockwell | model: | automation 1788-enbt | scope: | eq | version: | 0 | Trust: 1.2 |
vendor: | rockwell | model: | automation 1768-eweb | scope: | eq | version: | 0 | Trust: 1.2 |
vendor: | rockwell | model: | automation 1768-enbt | scope: | eq | version: | 0 | Trust: 1.2 |
vendor: | rockwell | model: | automation 1756-enbt | scope: | eq | version: | 0 | Trust: 1.2 |
vendor: | rockwell | model: | automation 1756-en2t series b | scope: | eq | version: | 0 | Trust: 1.2 |
EXPLOIT
To exploit this issue, attackers can use readily available network utilities.
Trust: 1.2
PRICE
Free
Trust: 1.2
TYPE
Design Error
Trust: 1.2
CREDITS
Rubén Santamarta
Trust: 1.2
EXTERNAL IDS
db: | ICS CERT | id: | ICSA-13-011-03 | Trust: 1.2 |
db: | NVD | id: | CVE-2012-6436 | Trust: 0.3 |
db: | BID | id: | 57311 | Trust: 0.3 |
db: | NVD | id: | CVE-2012-6438 | Trust: 0.3 |
db: | BID | id: | 57310 | Trust: 0.3 |
db: | NVD | id: | CVE-2012-6437 | Trust: 0.3 |
db: | BID | id: | 57317 | Trust: 0.3 |
db: | NVD | id: | CVE-2012-6440 | Trust: 0.3 |
db: | BID | id: | 57315 | Trust: 0.3 |
REFERENCES
url: | http://www.us-cert.gov/control_systems/pdf/icsa-13-011-03.pdf | Trust: 1.2 |
url: | http://www.rockwellautomation.com/ | Trust: 1.2 |
SOURCES
db: | BID | id: | 57311 |
db: | BID | id: | 57310 |
db: | BID | id: | 57317 |
db: | BID | id: | 57315 |
LAST UPDATE DATE
2022-07-27T09:27:35.762000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 57311 | date: | 2013-01-11T00:00:00 |
db: | BID | id: | 57310 | date: | 2013-01-11T00:00:00 |
db: | BID | id: | 57317 | date: | 2013-01-11T00:00:00 |
db: | BID | id: | 57315 | date: | 2013-01-11T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 57311 | date: | 2013-01-11T00:00:00 |
db: | BID | id: | 57310 | date: | 2013-01-11T00:00:00 |
db: | BID | id: | 57317 | date: | 2013-01-11T00:00:00 |
db: | BID | id: | 57315 | date: | 2013-01-11T00:00:00 |