ID

VAR-201702-0922


CVE

CVE-2016-9334


TITLE

plural Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 Vulnerability in obtaining authentication information in controller

Trust: 0.8

sources: JVNDB: JVNDB-2016-008008

DESCRIPTION

An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. User credentials are sent to the web server in clear text, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server. Rockwell Automation is a UK company providing information on industrial automation control and globalization. The MicroLogix 1100 and 1400 Series products are used in food, agriculture, and water and wastewater systems. There are unauthorized access vulnerabilities in Rockwell Automation MicroLogix 1100 and 1400. The attacker exploited the vulnerability to obtain sensitive information, unauthorized access to the affected device or denial of service. An attacker could exploit this vulnerability to obtain certificates

Trust: 2.7

sources: NVD: CVE-2016-9334 // JVNDB: JVNDB-2016-008008 // CNVD: CNVD-2017-00318 // BID: 95302 // IVD: e32f3890-85d5-4037-bb89-489e24febb37 // VULHUB: VHN-98154

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e32f3890-85d5-4037-bb89-489e24febb37 // CNVD: CNVD-2017-00318

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:1766-l32bxba series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwaa series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awaa series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awa series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16dwd series ascope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bwa series bscope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bwa series ascope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awaa series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bxba series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bbb series bscope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16awa series ascope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bbb series ascope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16dwd series bscope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwa series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awa series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bxb series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwaa series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwa series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16awa series bscope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bxb series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16awa series ascope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16awa series bscope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bbb series ascope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bbb series bscope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bwa series ascope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bwa series bscope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16dwd series ascope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16dwd series bscope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awa series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awa series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awaa series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awaa series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwa series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwa series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwaa series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwaa series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxb series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxb series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxba series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxba series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwellmodel:automation micrologixscope:eqversion:1100

Trust: 0.6

vendor:rockwellmodel:automation micrologixscope:eqversion:1400

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bwaa series ascope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1763-l16awa series ascope:eqversion:14.000

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bxba series ascope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32awaa series bscope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bxb series ascope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bxba series bscope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1763-l16bwa series ascope:eqversion:14.000

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bxb series bscope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32awaa series ascope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32awa series bscope:eqversion:15.004

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxba series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxba series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxb series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxb series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwd series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwd series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwa series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwa series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbb series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbb series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awa series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awa series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxba series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxb series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaa series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwa series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaa series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awa series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwd series bscope:neversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwa series bscope:neversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbb series bscope:neversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awa series bscope:neversion:110015.000

Trust: 0.3

vendor:1763 l16awa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16awa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bbb series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bbb series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bwa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bwa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16dwd series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16dwd series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awaa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awaa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwaa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwaa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxb series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxb series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxba series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxba series bmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: e32f3890-85d5-4037-bb89-489e24febb37 // CNVD: CNVD-2017-00318 // BID: 95302 // JVNDB: JVNDB-2016-008008 // CNNVD: CNNVD-201701-156 // NVD: CVE-2016-9334

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-9334
value: HIGH

Trust: 1.0

NVD: CVE-2016-9334
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-00318
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201701-156
value: MEDIUM

Trust: 0.6

IVD: e32f3890-85d5-4037-bb89-489e24febb37
value: MEDIUM

Trust: 0.2

VULHUB: VHN-98154
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-9334
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2016-9334
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2017-00318
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e32f3890-85d5-4037-bb89-489e24febb37
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-98154
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-9334
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.0

Trust: 1.8

sources: IVD: e32f3890-85d5-4037-bb89-489e24febb37 // CNVD: CNVD-2017-00318 // VULHUB: VHN-98154 // JVNDB: JVNDB-2016-008008 // CNNVD: CNNVD-201701-156 // NVD: CVE-2016-9334

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2016-008008 // NVD: CVE-2016-9334

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201701-156

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201701-156

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-008008

PATCH

title:MicroLogix 1100コントローラurl:http://ab.rockwellautomation.com/ja/Programmable-Controllers/MicroLogix-1100

Trust: 0.8

title:MicroLogix 1400コントローラurl:http://ab.rockwellautomation.com/ja/Programmable-Controllers/MicroLogix-1400

Trust: 0.8

title:Rockwell Automation MicroLogix 1100 and 1400 Unauthorized Access Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/87841

Trust: 0.6

title:Rockwell Automation MicroLogix 1100 and 1400 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66882

Trust: 0.6

sources: CNVD: CNVD-2017-00318 // JVNDB: JVNDB-2016-008008 // CNNVD: CNNVD-201701-156

EXTERNAL IDS

db:NVDid:CVE-2016-9334

Trust: 3.6

db:ICS CERTid:ICSA-16-336-06

Trust: 2.8

db:BIDid:95302

Trust: 2.6

db:CNNVDid:CNNVD-201701-156

Trust: 0.9

db:CNVDid:CNVD-2017-00318

Trust: 0.8

db:JVNDBid:JVNDB-2016-008008

Trust: 0.8

db:IVDid:E32F3890-85D5-4037-BB89-489E24FEBB37

Trust: 0.2

db:VULHUBid:VHN-98154

Trust: 0.1

sources: IVD: e32f3890-85d5-4037-bb89-489e24febb37 // CNVD: CNVD-2017-00318 // VULHUB: VHN-98154 // BID: 95302 // JVNDB: JVNDB-2016-008008 // CNNVD: CNNVD-201701-156 // NVD: CVE-2016-9334

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-336-06

Trust: 2.5

url:http://www.securityfocus.com/bid/95302

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9334

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-9334

Trust: 0.8

url:http://www.rockwellautomation.com/

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-16-336-06

Trust: 0.3

sources: CNVD: CNVD-2017-00318 // VULHUB: VHN-98154 // BID: 95302 // JVNDB: JVNDB-2016-008008 // CNNVD: CNNVD-201701-156 // NVD: CVE-2016-9334

CREDITS

Alexey Osipov and Ilya Karpov of Positive Technologies

Trust: 0.9

sources: BID: 95302 // CNNVD: CNNVD-201701-156

SOURCES

db:IVDid:e32f3890-85d5-4037-bb89-489e24febb37
db:CNVDid:CNVD-2017-00318
db:VULHUBid:VHN-98154
db:BIDid:95302
db:JVNDBid:JVNDB-2016-008008
db:CNNVDid:CNNVD-201701-156
db:NVDid:CVE-2016-9334

LAST UPDATE DATE

2025-04-20T23:33:01.012000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-00318date:2017-01-11T00:00:00
db:VULHUBid:VHN-98154date:2017-03-16T00:00:00
db:BIDid:95302date:2017-01-12T01:10:00
db:JVNDBid:JVNDB-2016-008008date:2017-04-07T00:00:00
db:CNNVDid:CNNVD-201701-156date:2017-01-09T00:00:00
db:NVDid:CVE-2016-9334date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:e32f3890-85d5-4037-bb89-489e24febb37date:2017-01-11T00:00:00
db:CNVDid:CNVD-2017-00318date:2017-01-11T00:00:00
db:VULHUBid:VHN-98154date:2017-02-13T00:00:00
db:BIDid:95302date:2017-01-05T00:00:00
db:JVNDBid:JVNDB-2016-008008date:2017-04-07T00:00:00
db:CNNVDid:CNNVD-201701-156date:2017-01-09T00:00:00
db:NVDid:CVE-2016-9334date:2017-02-13T21:59:01.580