ID

VAR-202003-1611


CVE

CVE-2020-6988


TITLE

plural Rockwell Automation Product authentication vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-003038

DESCRIPTION

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials. Rockwell Automation MicroLogix 1400 , MicroLogix 1100 controller, RSLogix 500 The software contains an authentication vulnerability.Information may be obtained. MicroLogix 1100 Controllers is a programmable logic controller. RSLogix 500 Software is a set of programming software for industrial control systems

Trust: 2.52

sources: NVD: CVE-2020-6988 // JVNDB: JVNDB-2020-003038 // CNVD: CNVD-2020-19520 // IVD: bdee3263-6f80-47b8-93aa-b7895dd82d23 // VULHUB: VHN-185113 // VULMON: CVE-2020-6988

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: bdee3263-6f80-47b8-93aa-b7895dd82d23 // CNVD: CNVD-2020-19520

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:micrologix 1400 bscope:lteversion:21.001

Trust: 1.0

vendor:rockwellautomationmodel:micrologix 1400 ascope:eqversion:*

Trust: 1.0

vendor:rockwellautomationmodel:micrologix 1100scope:eqversion:*

Trust: 1.0

vendor:rockwellautomationmodel:rslogix 500scope:lteversion:12.001

Trust: 1.0

vendor:rockwell automationmodel:micrologix 1100scope:eqversion:rslogix 5000

Trust: 0.8

vendor:rockwell automationmodel:micrologix 1400 ascope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:micrologix 1400 bscope:eqversion:21.001

Trust: 0.8

vendor:rockwell automationmodel:rslogix 5000scope:eqversion:12.001

Trust: 0.8

vendor:rockwellmodel:automation micrologix controllers series ascope:eqversion:1400

Trust: 0.6

vendor:rockwellmodel:automation micrologix controllers series bscope:eqversion:1400<=21.001

Trust: 0.6

vendor:rockwellmodel:automation micrologix controllersscope:eqversion:1100

Trust: 0.6

vendor:rockwellmodel:automation rslogix softwarescope:eqversion:500<=12.001

Trust: 0.6

vendor:micrologix 1400 amodel: - scope:eqversion:*

Trust: 0.2

vendor:micrologix 1400 bmodel: - scope:eqversion:*

Trust: 0.2

vendor:micrologix 1100model: - scope:eqversion:*

Trust: 0.2

vendor:rslogix 500model: - scope:eqversion:*

Trust: 0.2

sources: IVD: bdee3263-6f80-47b8-93aa-b7895dd82d23 // CNVD: CNVD-2020-19520 // JVNDB: JVNDB-2020-003038 // NVD: CVE-2020-6988

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-6988
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-003038
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-19520
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202003-550
value: HIGH

Trust: 0.6

IVD: bdee3263-6f80-47b8-93aa-b7895dd82d23
value: HIGH

Trust: 0.2

VULHUB: VHN-185113
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-6988
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-6988
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-003038
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-19520
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: bdee3263-6f80-47b8-93aa-b7895dd82d23
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-185113
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-6988
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-003038
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: bdee3263-6f80-47b8-93aa-b7895dd82d23 // CNVD: CNVD-2020-19520 // VULHUB: VHN-185113 // VULMON: CVE-2020-6988 // JVNDB: JVNDB-2020-003038 // CNNVD: CNNVD-202003-550 // NVD: CVE-2020-6988

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

problemtype:CWE-603

Trust: 1.0

sources: VULHUB: VHN-185113 // JVNDB: JVNDB-2020-003038 // NVD: CVE-2020-6988

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202003-550

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-202003-550

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-003038

PATCH

title:Top Pageurl:https://ab.rockwellautomation.com/

Trust: 0.8

title:Patch for Multiple Rockwell Automation product licensing issue vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/210943

Trust: 0.6

title:Multiple Rockwell Automation Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=111867

Trust: 0.6

title:Threatposturl:https://threatpost.com/critical-bugs-in-rockwell-johnson-controls-ics-gear/153602/

Trust: 0.1

sources: CNVD: CNVD-2020-19520 // VULMON: CVE-2020-6988 // JVNDB: JVNDB-2020-003038 // CNNVD: CNNVD-202003-550

EXTERNAL IDS

db:NVDid:CVE-2020-6988

Trust: 3.4

db:ICS CERTid:ICSA-20-070-06

Trust: 3.2

db:CNNVDid:CNNVD-202003-550

Trust: 0.9

db:CNVDid:CNVD-2020-19520

Trust: 0.8

db:JVNDBid:JVNDB-2020-003038

Trust: 0.8

db:NSFOCUSid:46118

Trust: 0.6

db:IVDid:BDEE3263-6F80-47B8-93AA-B7895DD82D23

Trust: 0.2

db:VULHUBid:VHN-185113

Trust: 0.1

db:VULMONid:CVE-2020-6988

Trust: 0.1

sources: IVD: bdee3263-6f80-47b8-93aa-b7895dd82d23 // CNVD: CNVD-2020-19520 // VULHUB: VHN-185113 // VULMON: CVE-2020-6988 // JVNDB: JVNDB-2020-003038 // CNNVD: CNNVD-202003-550 // NVD: CVE-2020-6988

REFERENCES

url:https://www.us-cert.gov/ics/advisories/icsa-20-070-06

Trust: 3.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6988

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6988

Trust: 0.8

url:http://www.nsfocus.net/vulndb/46118

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/177523

Trust: 0.1

url:https://threatpost.com/critical-bugs-in-rockwell-johnson-controls-ics-gear/153602/

Trust: 0.1

sources: CNVD: CNVD-2020-19520 // VULHUB: VHN-185113 // VULMON: CVE-2020-6988 // JVNDB: JVNDB-2020-003038 // CNNVD: CNNVD-202003-550 // NVD: CVE-2020-6988

SOURCES

db:IVDid:bdee3263-6f80-47b8-93aa-b7895dd82d23
db:CNVDid:CNVD-2020-19520
db:VULHUBid:VHN-185113
db:VULMONid:CVE-2020-6988
db:JVNDBid:JVNDB-2020-003038
db:CNNVDid:CNNVD-202003-550
db:NVDid:CVE-2020-6988

LAST UPDATE DATE

2024-11-23T22:05:45.338000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-19520date:2020-03-26T00:00:00
db:VULHUBid:VHN-185113date:2020-03-20T00:00:00
db:VULMONid:CVE-2020-6988date:2020-03-20T00:00:00
db:JVNDBid:JVNDB-2020-003038date:2020-04-02T00:00:00
db:CNNVDid:CNNVD-202003-550date:2020-03-23T00:00:00
db:NVDid:CVE-2020-6988date:2024-11-21T05:36:26.567

SOURCES RELEASE DATE

db:IVDid:bdee3263-6f80-47b8-93aa-b7895dd82d23date:2020-03-10T00:00:00
db:CNVDid:CNVD-2020-19520date:2020-03-26T00:00:00
db:VULHUBid:VHN-185113date:2020-03-16T00:00:00
db:VULMONid:CVE-2020-6988date:2020-03-16T00:00:00
db:JVNDBid:JVNDB-2020-003038date:2020-04-02T00:00:00
db:CNNVDid:CNNVD-202003-550date:2020-03-10T00:00:00
db:NVDid:CVE-2020-6988date:2020-03-16T16:15:14.767