ID

VAR-201804-0378


CVE

CVE-2017-14467


TITLE

Allen Bradley Micrologix 1400 Series Access control vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-013209

DESCRIPTION

An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE Description: Live rung edits are able to be made by an unauthenticated user allowing for addition, deletion, or modification of existing ladder logic. Additionally, faults and cpu state modification can be triggered if specific ladder logic is used. The AllenBradley Micrologix 1400 SeriesBFRN is a programmable logic controller from Rockwell Automation. An attacker could exploit a vulnerability to add, remove, or modify existing ladder logic

Trust: 2.43

sources: NVD: CVE-2017-14467 // JVNDB: JVNDB-2017-013209 // CNVD: CNVD-2018-08285 // IVD: e2eca05f-39ab-11e9-96fd-000c29342cb1 // VULHUB: VHN-105192

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: e2eca05f-39ab-11e9-96fd-000c29342cb1 // CNVD: CNVD-2018-08285

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:micrologix 1400 bscope:lteversion:21.2

Trust: 1.0

vendor:rockwell automationmodel:micrologix 1400scope:lteversion:b frn 21.2

Trust: 0.8

vendor:rockwellmodel:automation allen bradley micrologix series b frnscope:eqversion:1400<=21.2

Trust: 0.6

vendor:rockwellautomationmodel:micrologix 1400 bscope:eqversion:21.2

Trust: 0.6

vendor:micrologix 1400 bmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: e2eca05f-39ab-11e9-96fd-000c29342cb1 // CNVD: CNVD-2018-08285 // JVNDB: JVNDB-2017-013209 // CNNVD: CNNVD-201709-554 // NVD: CVE-2017-14467

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14467
value: CRITICAL

Trust: 1.0

talos-cna@cisco.com: CVE-2017-14467
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-14467
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-08285
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201709-554
value: CRITICAL

Trust: 0.6

IVD: e2eca05f-39ab-11e9-96fd-000c29342cb1
value: CRITICAL

Trust: 0.2

VULHUB: VHN-105192
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-14467
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-08285
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2eca05f-39ab-11e9-96fd-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-105192
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-14467
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

talos-cna@cisco.com: CVE-2017-14467
baseSeverity: CRITICAL
baseScore: 10.0
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 6.0
version: 3.0

Trust: 1.0

NVD: CVE-2017-14467
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: e2eca05f-39ab-11e9-96fd-000c29342cb1 // CNVD: CNVD-2018-08285 // VULHUB: VHN-105192 // JVNDB: JVNDB-2017-013209 // CNNVD: CNNVD-201709-554 // NVD: CVE-2017-14467 // NVD: CVE-2017-14467

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-105192 // JVNDB: JVNDB-2017-013209 // NVD: CVE-2017-14467

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-554

TYPE

Access control error

Trust: 0.8

sources: IVD: e2eca05f-39ab-11e9-96fd-000c29342cb1 // CNNVD: CNNVD-201709-554

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-013209

PATCH

title:MicroLogix 1400 プログラマブル・ロジック・コントローラ・システムurl:https://ab.rockwellautomation.com/ja/Programmable-Controllers/MicroLogix-1400

Trust: 0.8

sources: JVNDB: JVNDB-2017-013209

EXTERNAL IDS

db:NVDid:CVE-2017-14467

Trust: 3.3

db:TALOSid:TALOS-2017-0443

Trust: 3.1

db:CNNVDid:CNNVD-201709-554

Trust: 0.9

db:CNVDid:CNVD-2018-08285

Trust: 0.8

db:JVNDBid:JVNDB-2017-013209

Trust: 0.8

db:IVDid:E2ECA05F-39AB-11E9-96FD-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-105192

Trust: 0.1

sources: IVD: e2eca05f-39ab-11e9-96fd-000c29342cb1 // CNVD: CNVD-2018-08285 // VULHUB: VHN-105192 // JVNDB: JVNDB-2017-013209 // CNNVD: CNNVD-201709-554 // NVD: CVE-2017-14467

REFERENCES

url:https://www.talosintelligence.com/vulnerability_reports/talos-2017-0443

Trust: 3.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14467

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-14467

Trust: 0.8

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0443

Trust: 0.6

sources: CNVD: CNVD-2018-08285 // VULHUB: VHN-105192 // JVNDB: JVNDB-2017-013209 // CNNVD: CNNVD-201709-554 // NVD: CVE-2017-14467

SOURCES

db:IVDid:e2eca05f-39ab-11e9-96fd-000c29342cb1
db:CNVDid:CNVD-2018-08285
db:VULHUBid:VHN-105192
db:JVNDBid:JVNDB-2017-013209
db:CNNVDid:CNNVD-201709-554
db:NVDid:CVE-2017-14467

LAST UPDATE DATE

2024-11-23T21:39:27.817000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-08285date:2018-04-25T00:00:00
db:VULHUBid:VHN-105192date:2022-12-14T00:00:00
db:JVNDBid:JVNDB-2017-013209date:2018-06-06T00:00:00
db:CNNVDid:CNNVD-201709-554date:2022-04-20T00:00:00
db:NVDid:CVE-2017-14467date:2024-11-21T03:12:51.113

SOURCES RELEASE DATE

db:IVDid:e2eca05f-39ab-11e9-96fd-000c29342cb1date:2018-04-25T00:00:00
db:CNVDid:CNVD-2018-08285date:2018-04-25T00:00:00
db:VULHUBid:VHN-105192date:2018-04-05T00:00:00
db:JVNDBid:JVNDB-2017-013209date:2018-06-06T00:00:00
db:CNNVDid:CNNVD-201709-554date:2017-09-14T00:00:00
db:NVDid:CVE-2017-14467date:2018-04-05T21:29:00.867