ID

VAR-201301-0154


CVE

CVE-2012-6437


TITLE

Rockwell Automation ControlLogix Firmware upload vulnerability

Trust: 0.8

sources: IVD: 20403e12-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00289

DESCRIPTION

The device does not properly authenticate users and the potential exists for a remote user to upload a new firmware image to the Ethernet card, whether it is a corrupt or legitimate firmware image. Successful exploitation of this vulnerability could cause loss of availability, integrity, and confidentiality and a disruption in communications with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400. plural Rockwell Automation Products, Ethernet There is a vulnerability that allows arbitrary code to be executed due to improper authentication when updating firmware.A third party may be able to execute arbitrary code via a Trojan update image. Rockwell Automation MicroLogix is a programmable controller platform. Rockwell's products are affected by this vulnerability: all EtherNet/IP products that comply with CIP and EtherNet/IP specifications

Trust: 2.7

sources: NVD: CVE-2012-6437 // JVNDB: JVNDB-2013-001265 // CNVD: CNVD-2013-00289 // BID: 57317 // IVD: 20403e12-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-59718

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 20403e12-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00289

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:1756-enbtscope:eqversion: -

Trust: 1.6

vendor:rockwellautomationmodel:flexlogix 1788-enbt adapterscope:eqversion: -

Trust: 1.6

vendor:rockwellautomationmodel:1768-ewebscope:eqversion: -

Trust: 1.6

vendor:rockwellautomationmodel:compactlogix l35e controllerscope:eqversion: -

Trust: 1.6

vendor:rockwellautomationmodel:compactlogix l32e controllerscope:eqversion: -

Trust: 1.6

vendor:rockwellautomationmodel:1794-aentr flex i\/o ethernet\/ip adapterscope:eqversion: -

Trust: 1.6

vendor:rockwellautomationmodel:1756-ewebscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:1768-enbtscope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:guardlogixscope:lteversion:18

Trust: 1.0

vendor:rockwellautomationmodel:softlogixscope:lteversion:18

Trust: 1.0

vendor:rockwellautomationmodel:micrologixscope:lteversion:1400

Trust: 1.0

vendor:rockwellautomationmodel:softlogix controllersscope:lteversion:19

Trust: 1.0

vendor:rockwellautomationmodel:compactlogixscope:lteversion:18

Trust: 1.0

vendor:rockwellautomationmodel:controllogix controllersscope:lteversion:20

Trust: 1.0

vendor:rockwellautomationmodel:guardlogix controllersscope:lteversion:20

Trust: 1.0

vendor:rockwellautomationmodel:compactlogix controllersscope:lteversion:19

Trust: 1.0

vendor:rockwellautomationmodel:controllogixscope:lteversion:18

Trust: 1.0

vendor:rockwellautomationmodel:micrologixscope:lteversion:1100

Trust: 1.0

vendor:rockwell automationmodel:1756-enbtscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1756-ewebscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1768-enbtscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1768-ewebscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:compactlogix l32e controllerscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:compactlogix l35e controllerscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:compactlogix controllerscope:lteversion:18

Trust: 0.8

vendor:rockwell automationmodel:compactlogix controllerscope:lteversion:19

Trust: 0.8

vendor:rockwell automationmodel:controllogix controllerscope:lteversion:18

Trust: 0.8

vendor:rockwell automationmodel:controllogix controllerscope:lteversion:20

Trust: 0.8

vendor:rockwell automationmodel:flex i/o ethernet/ip adapter 1794-aentrscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:flexlogix 1788-enbtscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:guardlogix controllerscope:lteversion:18

Trust: 0.8

vendor:rockwell automationmodel:guardlogix controllerscope:lteversion:20

Trust: 0.8

vendor:rockwell automationmodel:micrologixscope:eqversion:1100

Trust: 0.8

vendor:rockwell automationmodel:micrologixscope:eqversion:1400

Trust: 0.8

vendor:rockwell automationmodel:softlogix controllerscope:lteversion:18

Trust: 0.8

vendor:rockwell automationmodel:softlogix controllerscope:lteversion:19

Trust: 0.8

vendor:rockwellmodel:automation controllogixscope: - version: -

Trust: 0.6

vendor:rockwellmodel:automation micrologixscope:eqversion:1100

Trust: 0.6

vendor:rockwellmodel:automation micrologixscope:eqversion:1400

Trust: 0.6

vendor:rockwellautomationmodel:compactlogixscope:eqversion:18

Trust: 0.6

vendor:rockwellautomationmodel:controllogixscope:eqversion:18

Trust: 0.6

vendor:rockwellautomationmodel:softlogixscope:eqversion:18

Trust: 0.6

vendor:rockwellautomationmodel:guardlogixscope:eqversion:18

Trust: 0.6

vendor:micrologixmodel: - scope:eqversion:*

Trust: 0.4

vendor:rockwellmodel:automation softlogixscope:eqversion:19

Trust: 0.3

vendor:rockwellmodel:automation softlogixscope:eqversion:18

Trust: 0.3

vendor:rockwellmodel:automation micrologixscope:eqversion:14000

Trust: 0.3

vendor:rockwellmodel:automation micrologixscope:eqversion:11000

Trust: 0.3

vendor:rockwellmodel:automation guardlogixscope:eqversion:20

Trust: 0.3

vendor:rockwellmodel:automation guardlogixscope:eqversion:18

Trust: 0.3

vendor:rockwellmodel:automation compactlogix l35escope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation compactlogix l32escope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation compactlogixscope:eqversion:19

Trust: 0.3

vendor:rockwellmodel:automation compactlogixscope:eqversion:18

Trust: 0.3

vendor:rockwellmodel:automation 1794-aentrscope:eqversion:0

Trust: 0.3

vendor:rockwellmodel:automation 1788-enbtscope:eqversion:0

Trust: 0.3

vendor:rockwellmodel:automation 1768-ewebscope:eqversion:0

Trust: 0.3

vendor:rockwellmodel:automation 1768-enbtscope:eqversion:0

Trust: 0.3

vendor:rockwellmodel:automation 1756-enbtscope:eqversion:0

Trust: 0.3

vendor:rockwellmodel:automation 1756-en2t series bscope:eqversion:0

Trust: 0.3

vendor:controllogix controllersmodel: - scope:eqversion:*

Trust: 0.2

vendor:guardlogix controllersmodel: - scope:eqversion:*

Trust: 0.2

vendor:softlogix controllersmodel: - scope:eqversion:*

Trust: 0.2

vendor:1756 enbtmodel: - scope:eqversion: -

Trust: 0.2

vendor:1756 ewebmodel: - scope:eqversion: -

Trust: 0.2

vendor:1768 enbtmodel: - scope:eqversion: -

Trust: 0.2

vendor:1768 ewebmodel: - scope:eqversion: -

Trust: 0.2

vendor:1794 aentr flex i o ethernet ip adaptermodel: - scope:eqversion: -

Trust: 0.2

vendor:compactlogixmodel: - scope:eqversion:*

Trust: 0.2

vendor:compactlogix controllersmodel: - scope:eqversion:*

Trust: 0.2

vendor:compactlogix l32e controllermodel: - scope:eqversion: -

Trust: 0.2

vendor:compactlogix l35e controllermodel: - scope:eqversion: -

Trust: 0.2

vendor:controllogixmodel: - scope:eqversion:*

Trust: 0.2

vendor:flexlogix 1788 enbt adaptermodel: - scope:eqversion: -

Trust: 0.2

vendor:guardlogixmodel: - scope:eqversion:*

Trust: 0.2

vendor:softlogixmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 20403e12-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00289 // BID: 57317 // JVNDB: JVNDB-2013-001265 // CNNVD: CNNVD-201301-460 // NVD: CVE-2012-6437

CVSS

SEVERITY

CVSSV2

CVSSV3

ics-cert@hq.dhs.gov: CVE-2012-6437
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2012-6437
value: HIGH

Trust: 1.0

NVD: CVE-2012-6437
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201301-460
value: CRITICAL

Trust: 0.6

IVD: 20403e12-2353-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULHUB: VHN-59718
value: HIGH

Trust: 0.1

ics-cert@hq.dhs.gov: CVE-2012-6437
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.8

IVD: 20403e12-2353-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-59718
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 20403e12-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-59718 // JVNDB: JVNDB-2013-001265 // CNNVD: CNNVD-201301-460 // NVD: CVE-2012-6437 // NVD: CVE-2012-6437

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-59718 // JVNDB: JVNDB-2013-001265 // NVD: CVE-2012-6437

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201301-460

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201301-460

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001265

PATCH

title:Top Pageurl:http://www.rockwellautomation.com/

Trust: 0.8

title:Partnerurl:http://jp.rockwellautomation.com/applications/gs/ap/gsjp.nsf/pages/partner

Trust: 0.8

title:Top Pageurl:http://jp.rockwellautomation.com/

Trust: 0.8

title:Rockwell Automation ControlLogix Firmware Upload Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/29212

Trust: 0.6

title:1768-ENBT_4.004.006url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45390

Trust: 0.6

title:1756-EWEB_4.016url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45389

Trust: 0.6

title:1756-ENBT_6.006url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45388

Trust: 0.6

sources: CNVD: CNVD-2013-00289 // JVNDB: JVNDB-2013-001265 // CNNVD: CNNVD-201301-460

EXTERNAL IDS

db:NVDid:CVE-2012-6437

Trust: 3.6

db:ICS CERTid:ICSA-13-011-03

Trust: 3.4

db:BIDid:57317

Trust: 1.0

db:CNNVDid:CNNVD-201301-460

Trust: 0.9

db:CNVDid:CNVD-2013-00289

Trust: 0.8

db:JVNDBid:JVNDB-2013-001265

Trust: 0.8

db:IVDid:20403E12-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:SEEBUGid:SSVID-89568

Trust: 0.1

db:VULHUBid:VHN-59718

Trust: 0.1

sources: IVD: 20403e12-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-00289 // VULHUB: VHN-59718 // BID: 57317 // JVNDB: JVNDB-2013-001265 // CNNVD: CNNVD-201301-460 // NVD: CVE-2012-6437

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-13-011-03.pdf

Trust: 3.4

url:https://rockwellautomation.custhelp.com/app/answers/detail/a_id/470154

Trust: 1.0

url:https://rockwellautomation.custhelp.com/app/answers/detail/aid/470156

Trust: 1.0

url:https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03

Trust: 1.0

url:http://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102

Trust: 1.0

url:https://rockwellautomation.custhelp.com/app/answers/detail/aid/470155

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6437

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6437

Trust: 0.8

url:http://www.securityfocus.com/bid/57317

Trust: 0.6

url:http://www.rockwellautomation.com/

Trust: 0.3

sources: CNVD: CNVD-2013-00289 // VULHUB: VHN-59718 // BID: 57317 // JVNDB: JVNDB-2013-001265 // CNNVD: CNNVD-201301-460 // NVD: CVE-2012-6437

CREDITS

Rub??n Santamarta

Trust: 0.6

sources: CNNVD: CNNVD-201301-460

SOURCES

db:IVDid:20403e12-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-00289
db:VULHUBid:VHN-59718
db:BIDid:57317
db:JVNDBid:JVNDB-2013-001265
db:CNNVDid:CNNVD-201301-460
db:NVDid:CVE-2012-6437

LAST UPDATE DATE

2025-07-01T23:04:31.157000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-00289date:2013-05-25T00:00:00
db:VULHUBid:VHN-59718date:2013-01-25T00:00:00
db:BIDid:57317date:2013-01-11T00:00:00
db:JVNDBid:JVNDB-2013-001265date:2013-01-28T00:00:00
db:CNNVDid:CNNVD-201301-460date:2013-01-24T00:00:00
db:NVDid:CVE-2012-6437date:2025-06-30T22:15:28.747

SOURCES RELEASE DATE

db:IVDid:20403e12-2353-11e6-abef-000c29c66e3ddate:2013-01-17T00:00:00
db:CNVDid:CNVD-2013-00289date:2013-01-17T00:00:00
db:VULHUBid:VHN-59718date:2013-01-24T00:00:00
db:BIDid:57317date:2013-01-11T00:00:00
db:JVNDBid:JVNDB-2013-001265date:2013-01-28T00:00:00
db:CNNVDid:CNNVD-201301-460date:2013-01-24T00:00:00
db:NVDid:CVE-2012-6437date:2013-01-24T21:55:01.523