ID

VAR-201608-0068


CVE

CVE-2016-5645


TITLE

Rockwell Automation MicroLogix Remote elevation of privilege vulnerability

Trust: 0.8

sources: IVD: 7fc78963-f8be-48a4-b1f6-f89bf3a2edc9 // CNVD: CNVD-2016-06333

DESCRIPTION

Rockwell Automation MicroLogix 1400 PLC 1766-L32BWA, 1766-L32AWA, 1766-L32BXB, 1766-L32BWAA, 1766-L32AWAA, and 1766-L32BXBA devices have a hardcoded SNMP community, which makes it easier for remote attackers to load arbitrary firmware updates by leveraging knowledge of this community. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlBy a third party SNMP Any firmware update may be loaded using community information. Rockwell Automation MicroLogix 1400 1766-L32BXBA and others are programmable logic controllers (PLCs) from Rockwell Automation. A remote privilege escalation vulnerability exists in the Rockwell Automation MicroLogix 1400. An attacker could exploit the vulnerability to gain elevated privileges and perform unauthorized actions

Trust: 2.7

sources: NVD: CVE-2016-5645 // JVNDB: JVNDB-2016-004446 // CNVD: CNVD-2016-06333 // BID: 92428 // IVD: 7fc78963-f8be-48a4-b1f6-f89bf3a2edc9 // VULHUB: VHN-94464

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 7fc78963-f8be-48a4-b1f6-f89bf3a2edc9 // CNVD: CNVD-2016-06333

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:1766-l32bxbscope:eqversion: -

Trust: 1.6

vendor:rockwellautomationmodel:1766-l32bwaascope:eqversion: -

Trust: 1.6

vendor:rockwellautomationmodel:1766-l32bwascope:eqversion: -

Trust: 1.6

vendor:rockwellautomationmodel:1766-l32bxbascope:eqversion: -

Trust: 1.6

vendor:rockwellautomationmodel:1766-l32awascope:eqversion: -

Trust: 1.6

vendor:rockwellautomationmodel:1766-l32awaascope:eqversion: -

Trust: 1.6

vendor:rockwell automationmodel:1766-l32awascope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1766-l32awaascope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1766-l32bwascope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1766-l32bwaascope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1766-l32bxbscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:1766-l32bxbascope: - version: -

Trust: 0.8

vendor:rockwellmodel:automation micrologix productsscope:eqversion:1400

Trust: 0.6

vendor:rockwellmodel:automation micrologix 1766-l32bxba series bscope:eqversion:140015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32bxba series ascope:eqversion:140015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32bxbascope:eqversion:14000

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32bxb series bscope:eqversion:140015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32bxb series ascope:eqversion:140015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32bxbscope:eqversion:14000

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32bwaa series bscope:eqversion:140015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32bwaa series ascope:eqversion:140015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32bwaascope:eqversion:14000

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32bwa series bscope:eqversion:140015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32bwascope:eqversion:14000

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32awaa series bscope:eqversion:140015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32awaa series ascope:eqversion:140015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32awaascope:eqversion:14000

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32awa series bscope:eqversion:140015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32awa series ascope:eqversion:140015.002

Trust: 0.3

vendor:rockwellmodel:automation micrologix 1766-l32awascope:eqversion:14000

Trust: 0.3

vendor:1766 l32awamodel: - scope:eqversion: -

Trust: 0.2

vendor:1766 l32awaamodel: - scope:eqversion: -

Trust: 0.2

vendor:1766 l32bwamodel: - scope:eqversion: -

Trust: 0.2

vendor:1766 l32bwaamodel: - scope:eqversion: -

Trust: 0.2

vendor:1766 l32bxbmodel: - scope:eqversion: -

Trust: 0.2

vendor:1766 l32bxbamodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: 7fc78963-f8be-48a4-b1f6-f89bf3a2edc9 // CNVD: CNVD-2016-06333 // BID: 92428 // JVNDB: JVNDB-2016-004446 // CNNVD: CNNVD-201608-282 // NVD: CVE-2016-5645

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5645
value: HIGH

Trust: 1.0

NVD: CVE-2016-5645
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-06333
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201608-282
value: HIGH

Trust: 0.6

IVD: 7fc78963-f8be-48a4-b1f6-f89bf3a2edc9
value: HIGH

Trust: 0.2

VULHUB: VHN-94464
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-5645
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-06333
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7fc78963-f8be-48a4-b1f6-f89bf3a2edc9
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-94464
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-5645
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.0

Trust: 1.8

sources: IVD: 7fc78963-f8be-48a4-b1f6-f89bf3a2edc9 // CNVD: CNVD-2016-06333 // VULHUB: VHN-94464 // JVNDB: JVNDB-2016-004446 // CNNVD: CNNVD-201608-282 // NVD: CVE-2016-5645

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-94464 // JVNDB: JVNDB-2016-004446 // NVD: CVE-2016-5645

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201608-282

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201608-282

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004446

PATCH

title:MicroLogix 1400 Programmable Logic Controller Systemsurl:http://ab.rockwellautomation.com/Programmable-Controllers/MicroLogix-1400

Trust: 0.8

sources: JVNDB: JVNDB-2016-004446

EXTERNAL IDS

db:NVDid:CVE-2016-5645

Trust: 3.6

db:ICS CERTid:ICSA-16-224-01

Trust: 2.8

db:BIDid:92428

Trust: 2.6

db:CNVDid:CNVD-2016-06333

Trust: 0.8

db:CNNVDid:CNNVD-201608-282

Trust: 0.8

db:JVNDBid:JVNDB-2016-004446

Trust: 0.8

db:IVDid:7FC78963-F8BE-48A4-B1F6-F89BF3A2EDC9

Trust: 0.2

db:VULHUBid:VHN-94464

Trust: 0.1

sources: IVD: 7fc78963-f8be-48a4-b1f6-f89bf3a2edc9 // CNVD: CNVD-2016-06333 // VULHUB: VHN-94464 // BID: 92428 // JVNDB: JVNDB-2016-004446 // CNNVD: CNNVD-201608-282 // NVD: CVE-2016-5645

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-224-01

Trust: 2.8

url:http://www.securityfocus.com/bid/92428

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5645

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5645

Trust: 0.8

url:http://www.rockwellautomation.com/

Trust: 0.3

sources: CNVD: CNVD-2016-06333 // VULHUB: VHN-94464 // BID: 92428 // JVNDB: JVNDB-2016-004446 // CNNVD: CNNVD-201608-282 // NVD: CVE-2016-5645

CREDITS

Cisco Talos

Trust: 0.9

sources: BID: 92428 // CNNVD: CNNVD-201608-282

SOURCES

db:IVDid:7fc78963-f8be-48a4-b1f6-f89bf3a2edc9
db:CNVDid:CNVD-2016-06333
db:VULHUBid:VHN-94464
db:BIDid:92428
db:JVNDBid:JVNDB-2016-004446
db:CNNVDid:CNNVD-201608-282
db:NVDid:CVE-2016-5645

LAST UPDATE DATE

2025-04-13T23:29:28.528000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-06333date:2016-08-16T00:00:00
db:VULHUBid:VHN-94464date:2016-11-28T00:00:00
db:BIDid:92428date:2016-08-11T00:00:00
db:JVNDBid:JVNDB-2016-004446date:2016-08-25T00:00:00
db:CNNVDid:CNNVD-201608-282date:2016-08-24T00:00:00
db:NVDid:CVE-2016-5645date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:7fc78963-f8be-48a4-b1f6-f89bf3a2edc9date:2016-08-16T00:00:00
db:CNVDid:CNVD-2016-06333date:2016-08-16T00:00:00
db:VULHUBid:VHN-94464date:2016-08-24T00:00:00
db:BIDid:92428date:2016-08-11T00:00:00
db:JVNDBid:JVNDB-2016-004446date:2016-08-25T00:00:00
db:CNNVDid:CNNVD-201608-282date:2016-08-15T00:00:00
db:NVDid:CVE-2016-5645date:2016-08-24T02:00:12.823