ID

VAR-201601-0027


CVE

CVE-2016-0868


TITLE

Rockwell Automation MicroLogix 1100 PLC Stack Buffer Overflow Vulnerability

Trust: 0.8

sources: IVD: 63099e7a-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-00717

DESCRIPTION

Stack-based buffer overflow on Rockwell Automation Allen-Bradley MicroLogix 1100 devices A through 15.000 and B before 15.002 allows remote attackers to execute arbitrary code via a crafted web request. Rockwell Automation Allen-Bradley MicroLogix 11001763-L16AWA is a programmable logic controller (PLC) product from Rockwell Corporation of the United States. Multiple MicroLogix 1100 PLC products are prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary-checks on user supplied data. Failed exploit attempts will likely cause denial-of-service conditions. Rockwell Automation Allen-Bradley MicroLogix 1100 1763-L16AWA, etc. The following models and revisions are affected: Allen-Bradley MicroLogix 1100 1763-L16AWA (Series B), 1763-L16BBB (Series B), 1763-L16BWA (Series B), 1763-L16DWD (Series B), 1763-L16AWA (Series A ), 1763-L16BBB (Series A), 1763-L16BWA (Series A), 1763-L16DWD (Series A) 15.000 and earlier

Trust: 2.7

sources: NVD: CVE-2016-0868 // JVNDB: JVNDB-2016-001520 // CNVD: CNVD-2016-00717 // BID: 81973 // IVD: 63099e7a-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-88378

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: 63099e7a-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-00717

AFFECTED PRODUCTS

vendor:rockwellmodel:automation 1763-l16bbbscope: - version: -

Trust: 1.2

vendor:rockwellmodel:automation 1763-l16bwascope: - version: -

Trust: 1.2

vendor:rockwellautomationmodel:1763-l16awa series ascope:eqversion:15.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bbb series bscope:eqversion:15.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bbb series ascope:eqversion:15.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16dwd series ascope:eqversion:15.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bwa series bscope:eqversion:15.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16dwd series bscope:eqversion:15.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16awa series bscope:eqversion:15.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bwa series ascope:eqversion:15.000

Trust: 1.0

vendor:rockwell automationmodel:1763-l16awa series ascope:lteversion:15.000

Trust: 0.8

vendor:rockwell automationmodel:1763-l16awa series bscope:ltversion:15.002

Trust: 0.8

vendor:rockwell automationmodel:1763-l16bbb series ascope:lteversion:15.000

Trust: 0.8

vendor:rockwell automationmodel:1763-l16bbb series bscope:ltversion:15.002

Trust: 0.8

vendor:rockwell automationmodel:1763-l16bwa series ascope:lteversion:15.000

Trust: 0.8

vendor:rockwell automationmodel:1763-l16bwa series bscope:ltversion:15.002

Trust: 0.8

vendor:rockwell automationmodel:1763-l16dwd series ascope:lteversion:15.000

Trust: 0.8

vendor:rockwell automationmodel:1763-l16dwd series bscope:ltversion:15.002

Trust: 0.8

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awascope:eqversion:1100

Trust: 0.6

vendor:rockwellmodel:automation 1763-l16dwdscope: - version: -

Trust: 0.6

vendor:rockwellmodel:automation 1763-l16awascope: - version: -

Trust: 0.6

vendor:rockwellmodel:automation 1763-l16dwdscope:lteversion:<=15.000

Trust: 0.6

vendor:rockwellautomationmodel:ab micrologix controllerscope:eqversion:1100

Trust: 0.6

vendor:rockwellmodel:automation micrologix plc 1763-l16dwd series bscope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation micrologix plc 1763-l16dwd series ascope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation micrologix plc 1763-l16bwa series bscope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation micrologix plc 1763-l16bwa series ascope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation micrologix plc 1763-l16bbb series bscope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation micrologix plc 1763-l16bbb series ascope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation micrologix plc 1763-l16awa series bscope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation micrologix plc 1763-l16awa series ascope:eqversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation micrologix plc 1763-l16dwd series bscope:neversion:110015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix plc 1763-l16bwa series bscope:neversion:110015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix plc 1763-l16bbb series bscope:neversion:110015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix plc 1763-l16awa series bscope:neversion:110015.002

Trust: 0.3

vendor:1763 l16awa series amodel: - scope:eqversion:15.000

Trust: 0.2

vendor:1763 l16awa series bmodel: - scope:eqversion:15.000

Trust: 0.2

vendor:1763 l16bbb series amodel: - scope:eqversion:15.000

Trust: 0.2

vendor:1763 l16bbb series bmodel: - scope:eqversion:15.000

Trust: 0.2

vendor:1763 l16bwa series amodel: - scope:eqversion:15.000

Trust: 0.2

vendor:1763 l16bwa series bmodel: - scope:eqversion:15.000

Trust: 0.2

vendor:1763 l16dwd series amodel: - scope:eqversion:15.000

Trust: 0.2

vendor:1763 l16dwd series bmodel: - scope:eqversion:15.000

Trust: 0.2

sources: IVD: 63099e7a-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-00717 // BID: 81973 // JVNDB: JVNDB-2016-001520 // CNNVD: CNNVD-201601-641 // NVD: CVE-2016-0868

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-0868
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-0868
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-00717
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201601-641
value: CRITICAL

Trust: 0.6

IVD: 63099e7a-2351-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULHUB: VHN-88378
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-0868
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-00717
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 63099e7a-2351-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-88378
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-0868
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: IVD: 63099e7a-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-00717 // VULHUB: VHN-88378 // JVNDB: JVNDB-2016-001520 // CNNVD: CNNVD-201601-641 // NVD: CVE-2016-0868

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-88378 // JVNDB: JVNDB-2016-001520 // NVD: CVE-2016-0868

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201601-641

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: 63099e7a-2351-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201601-641

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001520

PATCH

title:MicroLogix 1100 Programmable Logic Controller Systemsurl:http://ab.rockwellautomation.com/Programmable-Controllers/MicroLogix-1100

Trust: 0.8

title:RockwellAutomationMicroLogix1100PLC Stack Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/70955

Trust: 0.6

title:Rockwell Automation MicroLogix 1100 Fixes for stack-based buffer overflow vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59956

Trust: 0.6

sources: CNVD: CNVD-2016-00717 // JVNDB: JVNDB-2016-001520 // CNNVD: CNNVD-201601-641

EXTERNAL IDS

db:NVDid:CVE-2016-0868

Trust: 3.6

db:ICS CERTid:ICSA-16-026-02

Trust: 2.8

db:SECTRACKid:1034861

Trust: 1.1

db:CNNVDid:CNNVD-201601-641

Trust: 0.9

db:CNVDid:CNVD-2016-00717

Trust: 0.8

db:JVNDBid:JVNDB-2016-001520

Trust: 0.8

db:BIDid:81973

Trust: 0.4

db:IVDid:63099E7A-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-88378

Trust: 0.1

sources: IVD: 63099e7a-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-00717 // VULHUB: VHN-88378 // BID: 81973 // JVNDB: JVNDB-2016-001520 // CNNVD: CNNVD-201601-641 // NVD: CVE-2016-0868

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-026-02

Trust: 2.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0868

Trust: 1.4

url:http://www.securitytracker.com/id/1034861

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0868

Trust: 0.8

url:http://ab.rockwellautomation.com/programmable-controllers/micrologix-1100

Trust: 0.3

sources: CNVD: CNVD-2016-00717 // VULHUB: VHN-88378 // BID: 81973 // JVNDB: JVNDB-2016-001520 // CNNVD: CNNVD-201601-641 // NVD: CVE-2016-0868

CREDITS

David Atch of CyberX

Trust: 0.3

sources: BID: 81973

SOURCES

db:IVDid:63099e7a-2351-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2016-00717
db:VULHUBid:VHN-88378
db:BIDid:81973
db:JVNDBid:JVNDB-2016-001520
db:CNNVDid:CNNVD-201601-641
db:NVDid:CVE-2016-0868

LAST UPDATE DATE

2025-04-13T23:23:42.112000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-00717date:2016-02-01T00:00:00
db:VULHUBid:VHN-88378date:2016-12-22T00:00:00
db:BIDid:81973date:2016-01-26T00:00:00
db:JVNDBid:JVNDB-2016-001520date:2016-03-04T00:00:00
db:CNNVDid:CNNVD-201601-641date:2016-01-29T00:00:00
db:NVDid:CVE-2016-0868date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:63099e7a-2351-11e6-abef-000c29c66e3ddate:2016-02-01T00:00:00
db:CNVDid:CNVD-2016-00717date:2016-02-01T00:00:00
db:VULHUBid:VHN-88378date:2016-01-28T00:00:00
db:BIDid:81973date:2016-01-26T00:00:00
db:JVNDBid:JVNDB-2016-001520date:2016-02-29T00:00:00
db:CNNVDid:CNNVD-201601-641date:2016-01-27T00:00:00
db:NVDid:CVE-2016-0868date:2016-01-28T21:59:00.087