ID

VAR-201702-0924


CVE

CVE-2016-9338


TITLE

Rockwell Automation MicroLogix 1100 and 1400 Denial of service vulnerability

Trust: 0.8

sources: IVD: 5e63a1af-e437-493c-b213-ddbbd2a2de10 // CNVD: CNVD-2017-00317

DESCRIPTION

An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. Because of an Incorrect Permission Assignment for Critical Resource, users with administrator privileges may be able to remove all administrative users requiring a factory reset to restore ancillary web server function. Exploitation of this vulnerability will still allow the affected device to function in its capacity as a controller. plural Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 The controller grants improper privileges to critical resources, resulting in a vulnerability that removes all administrators.A user with administrator privileges may delete all administrators. Rockwell Automation is a UK company providing information on industrial automation control and globalization. The MicroLogix 1100 and 1400 Series products are used in food, agriculture, and water and wastewater systems. A denial of service vulnerability exists in Rockwell Automation MicroLogix 1100 and 1400. The attacker exploited the vulnerability to obtain sensitive information, unauthorized access to the affected device or a denial of service

Trust: 2.7

sources: NVD: CVE-2016-9338 // JVNDB: JVNDB-2016-008009 // CNVD: CNVD-2017-00317 // BID: 95302 // IVD: 5e63a1af-e437-493c-b213-ddbbd2a2de10 // VULHUB: VHN-98158

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 5e63a1af-e437-493c-b213-ddbbd2a2de10 // CNVD: CNVD-2017-00317

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:1766-l32bxba series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwaa series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awaa series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awa series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16dwd series ascope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bwa series bscope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bwa series ascope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awaa series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bxba series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bbb series bscope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16awa series ascope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16bbb series ascope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16dwd series bscope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwa series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32awa series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bxb series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwaa series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bwa series ascope:lteversion:15.004

Trust: 1.0

vendor:rockwellautomationmodel:1763-l16awa series bscope:lteversion:14.000

Trust: 1.0

vendor:rockwellautomationmodel:1766-l32bxb series bscope:lteversion:15.004

Trust: 1.0

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16awa series ascope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16awa series bscope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bbb series ascope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bbb series bscope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bwa series ascope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16bwa series bscope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16dwd series ascope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1100 1763-l16dwd series bscope:lteversion:14.000

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awa series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awa series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awaa series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32awaa series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwa series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwa series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwaa series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bwaa series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxb series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxb series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxba series ascope:lteversion:15.004

Trust: 0.8

vendor:rockwell automationmodel:allen-bradley micrologix 1400 1766-l32bxba series bscope:lteversion:15.004

Trust: 0.8

vendor:rockwellmodel:automation micrologixscope:eqversion:1100

Trust: 0.6

vendor:rockwellmodel:automation micrologixscope:eqversion:1400

Trust: 0.6

vendor:rockwellautomationmodel:1763-l16awa series ascope:eqversion:14.000

Trust: 0.6

vendor:rockwellautomationmodel:1763-l16bwa series bscope:eqversion:14.000

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bxba series ascope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32awaa series bscope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bxb series ascope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32bxba series bscope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1763-l16bwa series ascope:eqversion:14.000

Trust: 0.6

vendor:rockwellautomationmodel:1766-l32awaa series ascope:eqversion:15.004

Trust: 0.6

vendor:rockwellautomationmodel:1763-l16bbb series ascope:eqversion:14.000

Trust: 0.6

vendor:rockwellautomationmodel:1763-l16dwd series ascope:eqversion:14.000

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxba series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxba series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxb series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxb series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awa series bscope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awa series ascope:eqversion:140015.004

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwd series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwd series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwa series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwa series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbb series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbb series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awa series bscope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awa series ascope:eqversion:110014.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxba series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bxb series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwaa series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32bwa series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awaa series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1766-l32awa series bscope:neversion:140016.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16dwd series bscope:neversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bwa series bscope:neversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16bbb series bscope:neversion:110015.000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley micrologix 1763-l16awa series bscope:neversion:110015.000

Trust: 0.3

vendor:1763 l16awa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16awa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bbb series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bbb series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bwa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16bwa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16dwd series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1763 l16dwd series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awaa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32awaa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwaa series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bwaa series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxb series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxb series bmodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxba series amodel: - scope:eqversion:*

Trust: 0.2

vendor:1766 l32bxba series bmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 5e63a1af-e437-493c-b213-ddbbd2a2de10 // CNVD: CNVD-2017-00317 // BID: 95302 // JVNDB: JVNDB-2016-008009 // CNNVD: CNNVD-201701-157 // NVD: CVE-2016-9338

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-9338
value: LOW

Trust: 1.0

NVD: CVE-2016-9338
value: LOW

Trust: 0.8

CNVD: CNVD-2017-00317
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201701-157
value: MEDIUM

Trust: 0.6

IVD: 5e63a1af-e437-493c-b213-ddbbd2a2de10
value: MEDIUM

Trust: 0.2

VULHUB: VHN-98158
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-9338
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-00317
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 5e63a1af-e437-493c-b213-ddbbd2a2de10
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-98158
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-9338
baseSeverity: LOW
baseScore: 2.7
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 1.2
impactScore: 1.4
version: 3.0

Trust: 1.8

sources: IVD: 5e63a1af-e437-493c-b213-ddbbd2a2de10 // CNVD: CNVD-2017-00317 // VULHUB: VHN-98158 // JVNDB: JVNDB-2016-008009 // CNNVD: CNNVD-201701-157 // NVD: CVE-2016-9338

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2016-008009 // NVD: CVE-2016-9338

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201701-157

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201701-157

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-008009

PATCH

title:MicroLogix 1100コントローラurl:http://ab.rockwellautomation.com/ja/Programmable-Controllers/MicroLogix-1100

Trust: 0.8

title:MicroLogix 1400コントローラurl:http://ab.rockwellautomation.com/ja/Programmable-Controllers/MicroLogix-1400

Trust: 0.8

title:Rockwell Automation MicroLogix 1100 and 1400 Patch for Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/87840

Trust: 0.6

title:Rockwell Automation MicroLogix 1100 and 1400 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66883

Trust: 0.6

sources: CNVD: CNVD-2017-00317 // JVNDB: JVNDB-2016-008009 // CNNVD: CNNVD-201701-157

EXTERNAL IDS

db:NVDid:CVE-2016-9338

Trust: 3.6

db:ICS CERTid:ICSA-16-336-06

Trust: 2.8

db:BIDid:95302

Trust: 2.6

db:CNNVDid:CNNVD-201701-157

Trust: 0.9

db:CNVDid:CNVD-2017-00317

Trust: 0.8

db:JVNDBid:JVNDB-2016-008009

Trust: 0.8

db:IVDid:5E63A1AF-E437-493C-B213-DDBBD2A2DE10

Trust: 0.2

db:VULHUBid:VHN-98158

Trust: 0.1

sources: IVD: 5e63a1af-e437-493c-b213-ddbbd2a2de10 // CNVD: CNVD-2017-00317 // VULHUB: VHN-98158 // BID: 95302 // JVNDB: JVNDB-2016-008009 // CNNVD: CNNVD-201701-157 // NVD: CVE-2016-9338

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-336-06

Trust: 2.5

url:http://www.securityfocus.com/bid/95302

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9338

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-9338

Trust: 0.8

url:http://www.rockwellautomation.com/

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-16-336-06

Trust: 0.3

sources: CNVD: CNVD-2017-00317 // VULHUB: VHN-98158 // BID: 95302 // JVNDB: JVNDB-2016-008009 // CNNVD: CNNVD-201701-157 // NVD: CVE-2016-9338

CREDITS

Alexey Osipov and Ilya Karpov of Positive Technologies

Trust: 0.9

sources: BID: 95302 // CNNVD: CNNVD-201701-157

SOURCES

db:IVDid:5e63a1af-e437-493c-b213-ddbbd2a2de10
db:CNVDid:CNVD-2017-00317
db:VULHUBid:VHN-98158
db:BIDid:95302
db:JVNDBid:JVNDB-2016-008009
db:CNNVDid:CNNVD-201701-157
db:NVDid:CVE-2016-9338

LAST UPDATE DATE

2025-04-20T23:33:01.053000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-00317date:2017-01-11T00:00:00
db:VULHUBid:VHN-98158date:2017-03-16T00:00:00
db:BIDid:95302date:2017-01-12T01:10:00
db:JVNDBid:JVNDB-2016-008009date:2017-04-07T00:00:00
db:CNNVDid:CNNVD-201701-157date:2017-01-09T00:00:00
db:NVDid:CVE-2016-9338date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:5e63a1af-e437-493c-b213-ddbbd2a2de10date:2017-01-11T00:00:00
db:CNVDid:CNVD-2017-00317date:2017-01-11T00:00:00
db:VULHUBid:VHN-98158date:2017-02-13T00:00:00
db:BIDid:95302date:2017-01-05T00:00:00
db:JVNDBid:JVNDB-2016-008009date:2017-04-07T00:00:00
db:CNNVDid:CNNVD-201701-157date:2017-01-09T00:00:00
db:NVDid:CVE-2016-9338date:2017-02-13T21:59:01.627