Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-7914 (GCVE-0-2017-7914)
Vulnerability from cvelistv5
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Rockwell Automation PanelView Plus 6 700-1500 |
Version: Rockwell Automation PanelView Plus 6 700-1500 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T16:19:29.506Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Rockwell Automation PanelView Plus 6 700-1500",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Rockwell Automation PanelView Plus 6 700-1500"
}
]
}
],
"datePublic": "2017-06-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-882",
"description": "CWE-882",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-06-14T20:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2017-7914",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Rockwell Automation PanelView Plus 6 700-1500",
"version": {
"version_data": [
{
"version_value": "Rockwell Automation PanelView Plus 6 700-1500"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-882"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2017-7914",
"datePublished": "2017-06-14T21:00:00",
"dateReserved": "2017-04-18T00:00:00",
"dateUpdated": "2024-08-05T16:19:29.506Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2017-7914\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2017-06-14T21:29:00.270\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema de falta de autorizaci\u00f3n en Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730 y 8.00-20141023. No hay comprobaci\u00f3n de autorizaci\u00f3n al conectarse al dispositivo, lo que permite que un atacante logre el acceso remoto.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-882\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00-20140306:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7EBA0A2-F6F2-4DF0-8FAC-37E5C6768734\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7498C8EB-B040-4B5E-BB67-630986C417E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DC3FD03-CA9F-427D-B8AB-2280A60738B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7522CC96-D5E9-41AF-95AB-876303767B1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.10-20140122:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B07AC6A-EFDA-4CC5-937C-6CAD73B3A1C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.10.20121012:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00391FDB-1094-4FB3-9938-9DEDB1045AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20121012:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"374DABE1-5D77-4EE3-853A-9FF5AD820861\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20130108:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"031AD257-1BE1-4061-BC6D-1AA0741C99EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20130325:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F9743D5-67E5-4DA5-BFDB-E42CD73A8306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20130619:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4A0042-86AF-4BB9-9114-F19777F6312A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140128:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78DDD0D2-E7F6-43A9-99A6-6D12B153BB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140310:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48CAEE93-3120-4F22-8BE0-46195D489015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140429:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F58A9CCD-3C23-4D1C-815E-C9D107F47B76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140621:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"214CB7C5-6241-4589-AA91-014E334FFB41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140729:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46DC9731-1EA9-4354-959E-494905A45963\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20141022:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F3DB916-F40E-4F80-9B28-0CB573585E1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:8.00-20140730:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94994F4E-0F1D-46FC-A7B2-462838BA4DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:8.00-20141023:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C8CD419-33AB-43C0-836F-8CC4AFD5F6FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rockwellautomation:panelview_plus_6_700-1500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3064E9-5257-4D66-A127-E30944447752\"}]}]}],\"references\":[{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
cnvd-2017-15839
Vulnerability from cnvd
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://rockwellautomationcom/
| Name | Rockwell Automation PanelView Plus 6 700-1500 |
|---|
{
"bids": {
"bid": {
"bidNumber": "99069"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-7914"
}
},
"description": "Rockwell Automation PanelView Plus\u662f\u7f8e\u56fd\u7f57\u514b\u97e6\u5c14\uff08Rockwell Automation\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u53ef\u7f16\u7a0b\u7684\u56fe\u5f62\u754c\u9762\u7ec8\u7aef\u3002\r\n\r\nRockwell Automation PanelView Plus 6 700-1500\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6267\u884c\u8eab\u4efd\u9a8c\u8bc1\u68c0\u6d4b\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8bbf\u95ee\u8bbe\u5907\uff0c\u68c0\u7d22\u6570\u636e\u6216\u7834\u574f\u8bbe\u5907\u7684\u53ef\u7528\u6027\u3002",
"discovererName": "Rockwell Automation",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://rockwellautomationcom/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-15839",
"openTime": "2017-07-21",
"patchDescription": "Rockwell Automation PanelView Plus\u662f\u7f8e\u56fd\u7f57\u514b\u97e6\u5c14\uff08Rockwell Automation\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u53ef\u7f16\u7a0b\u7684\u56fe\u5f62\u754c\u9762\u7ec8\u7aef\u3002\r\n\r\nRockwell Automation PanelView Plus 6 700-1500\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6267\u884c\u8eab\u4efd\u9a8c\u8bc1\u68c0\u6d4b\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8bbf\u95ee\u8bbe\u5907\uff0c\u68c0\u7d22\u6570\u636e\u6216\u7834\u574f\u8bbe\u5907\u7684\u53ef\u7528\u6027\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Rockwell Automation PanelView Plus\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Rockwell Automation PanelView Plus 6 700-1500"
},
"referenceLink": "http://www.securityfocus.com/bid/99069",
"serverity": "\u9ad8",
"submitTime": "2017-06-21",
"title": "Rockwell Automation PanelView Plus\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e"
}
icsa-17-157-01
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Rockwell Automation",
"summary": "self-reporting this vulnerability"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "ATTENTION: Remotely exploitable/low skill level to exploit",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing, Energy, Food and Agriculture, Transportation Systems, and Water and Wastewater Systems.",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "NCCIC/ICS-CERT and Rockwell Automation recommend that users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target this vulnerability.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-17-157-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsa-17-157-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-17-157-01 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-157-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/898270"
}
],
"title": "Rockwell Automation PanelView Plus 6 700-1500",
"tracking": {
"current_release_date": "2017-06-06T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-17-157-01",
"initial_release_date": "2017-06-06T00:00:00.000000Z",
"revision_history": [
{
"date": "2017-06-06T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-17-157-01 Rockwell Automation PanelView Plus 6 700-1500"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "8.00-20140730",
"product": {
"name": "PanelView Plus 6 700-1500: 8.00-20140730",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20140429",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20140429",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20130619",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20130619",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.00.42",
"product": {
"name": "PanelView Plus 6 700-1500: 6.00.42",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20140128",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20140128",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20140310",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20140310",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20130108",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20130108",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20130325",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20130325",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20140621",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20140621",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "8.00-20141023",
"product": {
"name": "PanelView Plus 6 700-1500: 8.00-20141023",
"product_id": "CSAFPID-00010"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.10.20121012",
"product": {
"name": "PanelView Plus 6 700-1500: 6.10.20121012",
"product_id": "CSAFPID-00011"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.00.05",
"product": {
"name": "PanelView Plus 6 700-1500: 6.00.05",
"product_id": "CSAFPID-00012"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20121012",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20121012",
"product_id": "CSAFPID-00013"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20141022",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20141022",
"product_id": "CSAFPID-00014"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20140729",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20140729",
"product_id": "CSAFPID-00015"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.00-20140306",
"product": {
"name": "PanelView Plus 6 700-1500: 6.00-20140306",
"product_id": "CSAFPID-00016"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.00.04",
"product": {
"name": "PanelView Plus 6 700-1500: 6.00.04",
"product_id": "CSAFPID-00017"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.10-20140122",
"product": {
"name": "PanelView Plus 6 700-1500: 6.10-20140122",
"product_id": "CSAFPID-00018"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
}
],
"category": "vendor",
"name": "Rockwell Automation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-7914",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "There is no authorization check when connecting to the device, allowing an attacker remote access.CVE-2017-7914 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7914"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation has released a security advisory found at the following link. A login is required to view the advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1047345/page/1"
},
{
"category": "mitigation",
"details": "V7.00: Apply V7.00-20150209",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
{
"category": "mitigation",
"details": "V8.00: Apply V8.00-20160418",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
{
"category": "mitigation",
"details": "V8.10: Apply V8.10-20151026 or later",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
{
"category": "mitigation",
"details": "V8.20: Apply V8.20-20160308 or later",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
{
"category": "mitigation",
"details": "V9.00: Apply V9.00-20170328 or later",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
{
"category": "mitigation",
"details": "Downloads for the firmware revisions can be found at their website",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
],
"url": "http://compatibility.rockwellautomation.com/Pages/MultiProductDownload.aspx?Keyword=2711P\u0026crumb=112"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
}
]
}
]
}
ICSA-17-157-01
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Rockwell Automation",
"summary": "self-reporting this vulnerability"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "ATTENTION: Remotely exploitable/low skill level to exploit",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing, Energy, Food and Agriculture, Transportation Systems, and Water and Wastewater Systems.",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "NCCIC/ICS-CERT and Rockwell Automation recommend that users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target this vulnerability.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-17-157-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsa-17-157-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-17-157-01 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-157-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/898270"
}
],
"title": "Rockwell Automation PanelView Plus 6 700-1500",
"tracking": {
"current_release_date": "2017-06-06T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-17-157-01",
"initial_release_date": "2017-06-06T00:00:00.000000Z",
"revision_history": [
{
"date": "2017-06-06T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-17-157-01 Rockwell Automation PanelView Plus 6 700-1500"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "8.00-20140730",
"product": {
"name": "PanelView Plus 6 700-1500: 8.00-20140730",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20140429",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20140429",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20130619",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20130619",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.00.42",
"product": {
"name": "PanelView Plus 6 700-1500: 6.00.42",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20140128",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20140128",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20140310",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20140310",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20130108",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20130108",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20130325",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20130325",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20140621",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20140621",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "8.00-20141023",
"product": {
"name": "PanelView Plus 6 700-1500: 8.00-20141023",
"product_id": "CSAFPID-00010"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.10.20121012",
"product": {
"name": "PanelView Plus 6 700-1500: 6.10.20121012",
"product_id": "CSAFPID-00011"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.00.05",
"product": {
"name": "PanelView Plus 6 700-1500: 6.00.05",
"product_id": "CSAFPID-00012"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20121012",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20121012",
"product_id": "CSAFPID-00013"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20141022",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20141022",
"product_id": "CSAFPID-00014"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "7.00-20140729",
"product": {
"name": "PanelView Plus 6 700-1500: 7.00-20140729",
"product_id": "CSAFPID-00015"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.00-20140306",
"product": {
"name": "PanelView Plus 6 700-1500: 6.00-20140306",
"product_id": "CSAFPID-00016"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.00.04",
"product": {
"name": "PanelView Plus 6 700-1500: 6.00.04",
"product_id": "CSAFPID-00017"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
},
{
"branches": [
{
"category": "product_version",
"name": "6.10-20140122",
"product": {
"name": "PanelView Plus 6 700-1500: 6.10-20140122",
"product_id": "CSAFPID-00018"
}
}
],
"category": "product_name",
"name": "PanelView Plus 6 700-1500"
}
],
"category": "vendor",
"name": "Rockwell Automation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-7914",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "summary",
"text": "There is no authorization check when connecting to the device, allowing an attacker remote access.CVE-2017-7914 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7914"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation has released a security advisory found at the following link. A login is required to view the advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1047345/page/1"
},
{
"category": "mitigation",
"details": "V7.00: Apply V7.00-20150209",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
{
"category": "mitigation",
"details": "V8.00: Apply V8.00-20160418",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
{
"category": "mitigation",
"details": "V8.10: Apply V8.10-20151026 or later",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
{
"category": "mitigation",
"details": "V8.20: Apply V8.20-20160308 or later",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
{
"category": "mitigation",
"details": "V9.00: Apply V9.00-20170328 or later",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
},
{
"category": "mitigation",
"details": "Downloads for the firmware revisions can be found at their website",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
],
"url": "http://compatibility.rockwellautomation.com/Pages/MultiProductDownload.aspx?Keyword=2711P\u0026crumb=112"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018"
]
}
]
}
]
}
gsd-2017-7914
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2017-7914",
"description": "A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access.",
"id": "GSD-2017-7914"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-7914"
],
"details": "A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access.",
"id": "GSD-2017-7914",
"modified": "2023-12-13T01:21:07.023857Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2017-7914",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Rockwell Automation PanelView Plus 6 700-1500",
"version": {
"version_data": [
{
"version_value": "Rockwell Automation PanelView Plus 6 700-1500"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-882"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20121012:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20130108:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00-20140306:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:8.00-20140730:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20130325:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140621:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20141022:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.10-20140122:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20130619:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140128:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140310:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140429:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:8.00-20141023:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140729:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.10.20121012:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:panelview_plus_6_700-1500:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2017-7914"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
},
"lastModifiedDate": "2019-10-09T23:29Z",
"publishedDate": "2017-06-14T21:29Z"
}
}
}
fkie_cve-2017-7914
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01 | Third Party Advisory, US Government Resource |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00-20140306:*:*:*:*:*:*:*",
"matchCriteriaId": "A7EBA0A2-F6F2-4DF0-8FAC-37E5C6768734",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00.04:*:*:*:*:*:*:*",
"matchCriteriaId": "7498C8EB-B040-4B5E-BB67-630986C417E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00.05:*:*:*:*:*:*:*",
"matchCriteriaId": "5DC3FD03-CA9F-427D-B8AB-2280A60738B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.00.42:*:*:*:*:*:*:*",
"matchCriteriaId": "7522CC96-D5E9-41AF-95AB-876303767B1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.10-20140122:*:*:*:*:*:*:*",
"matchCriteriaId": "8B07AC6A-EFDA-4CC5-937C-6CAD73B3A1C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:6.10.20121012:*:*:*:*:*:*:*",
"matchCriteriaId": "00391FDB-1094-4FB3-9938-9DEDB1045AD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20121012:*:*:*:*:*:*:*",
"matchCriteriaId": "374DABE1-5D77-4EE3-853A-9FF5AD820861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20130108:*:*:*:*:*:*:*",
"matchCriteriaId": "031AD257-1BE1-4061-BC6D-1AA0741C99EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20130325:*:*:*:*:*:*:*",
"matchCriteriaId": "3F9743D5-67E5-4DA5-BFDB-E42CD73A8306",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20130619:*:*:*:*:*:*:*",
"matchCriteriaId": "3C4A0042-86AF-4BB9-9114-F19777F6312A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140128:*:*:*:*:*:*:*",
"matchCriteriaId": "78DDD0D2-E7F6-43A9-99A6-6D12B153BB1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140310:*:*:*:*:*:*:*",
"matchCriteriaId": "48CAEE93-3120-4F22-8BE0-46195D489015",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140429:*:*:*:*:*:*:*",
"matchCriteriaId": "F58A9CCD-3C23-4D1C-815E-C9D107F47B76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140621:*:*:*:*:*:*:*",
"matchCriteriaId": "214CB7C5-6241-4589-AA91-014E334FFB41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20140729:*:*:*:*:*:*:*",
"matchCriteriaId": "46DC9731-1EA9-4354-959E-494905A45963",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:7.00-20141022:*:*:*:*:*:*:*",
"matchCriteriaId": "6F3DB916-F40E-4F80-9B28-0CB573585E1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:8.00-20140730:*:*:*:*:*:*:*",
"matchCriteriaId": "94994F4E-0F1D-46FC-A7B2-462838BA4DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:rockwellautomation:panelview_plus_6_700-1500_firmware:8.00-20141023:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8CD419-33AB-43C0-836F-8CC4AFD5F6FE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rockwellautomation:panelview_plus_6_700-1500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B3064E9-5257-4D66-A127-E30944447752",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access."
},
{
"lang": "es",
"value": "Se ha descubierto un problema de falta de autorizaci\u00f3n en Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730 y 8.00-20141023. No hay comprobaci\u00f3n de autorizaci\u00f3n al conectarse al dispositivo, lo que permite que un atacante logre el acceso remoto."
}
],
"id": "CVE-2017-7914",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-06-14T21:29:00.270",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-882"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-862"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ghsa-9x29-2vqv-frg8
Vulnerability from github
A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access.
{
"affected": [],
"aliases": [
"CVE-2017-7914"
],
"database_specific": {
"cwe_ids": [
"CWE-862"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-06-14T21:29:00Z",
"severity": "HIGH"
},
"details": "A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access.",
"id": "GHSA-9x29-2vqv-frg8",
"modified": "2022-05-13T01:36:14Z",
"published": "2022-05-13T01:36:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7914"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-157-01"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"type": "CVSS_V3"
}
]
}
var-201706-0662
Vulnerability from variot
A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access. A security vulnerability exists in Rockwell Automation PanelView Plus 6 700-1500 that caused the program to fail to perform authentication detection. The following versions are affected: Rockwell Automation PanelView Plus 6 700-1500 Version 6.00.04, Version 6.00.05, Version 6.00.42, Version 6.00-20140306, Version 6.10.20121012, Version 6.10-20140122, Version 7.00-20121012, Version 7.00- Vers, 7.00-20130325 version, 7.00-20130619 version, 7.00-20140128 version, 7.00-20140310 version, 7.00-20140429 version, 7.00-20140729 version, 7.00-20140729, 7.00-20140621 version, 7.00-20141022, 8.00-00. 20141023 version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0662",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "6.10-20140122"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "6.00-20140306"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "7.00-20140729"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "7.00-20130108"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "6.00.42"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "6.00.05"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "6.10.20121012"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "7.00-20121012"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "6.00.04"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.6,
"vendor": "rockwellautomation",
"version": "7.00-20141022"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "8.00-20140730"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "7.00-20140621"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "7.00-20140310"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "7.00-20130619"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "8.00-20141023"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "7.00-20140128"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "7.00-20140429"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "7.00-20130325"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "6.00-20140306"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "6.00.04"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "6.00.05"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "6.00.42"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "6.10-20140122"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "6.10.20121012"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "7.00-20121012"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "7.00-20130108"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "7.00-20130325"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "7.00-20130619"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "7.00-20140128"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "7.00-20140310"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "7.00-20140429"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "7.00-20140621"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "7.00-20140729"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "7.00-20141022"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "8.00-20140730"
},
{
"model": "panelview plus 6 700-1500",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "8.00-20141023"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "6700-1500"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15006.10.20121012"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15006.0.42"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15006.0.5"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15006.0.4"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15008.00-20141023"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15008.00-20140730"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15007.00-20141022"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15007.00-20140729"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15007.00-20140621"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15007.00-20140429"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15007.00-20140310"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15007.00-20140128"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15007.00-20130619"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15007.00-20130325"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15007.00-20130108"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15007.00-20121012"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15006.10-20140122"
},
{
"model": "automation panelview plus",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15006.00-20140306"
},
{
"model": "automation panelview plus",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15008.00-20160418"
},
{
"model": "automation panelview plus",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "6700-15007.00-20150209"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "6.00-20140306"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "6.00.04"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "6.00.05"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "6.00.42"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "6.10-20140122"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "6.10.20121012"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "7.00-20121012"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "7.00-20130108"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "7.00-20130325"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "7.00-20130619"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "7.00-20140128"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "7.00-20140310"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "7.00-20140429"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "7.00-20140621"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "7.00-20140729"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "7.00-20141022"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "8.00-20140730"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "panelview plus 6 700 1500",
"version": "8.00-20141023"
}
],
"sources": [
{
"db": "IVD",
"id": "b3d00c52-ffd5-41e3-accf-240483c08e12"
},
{
"db": "CNVD",
"id": "CNVD-2017-15839"
},
{
"db": "BID",
"id": "99069"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005222"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-598"
},
{
"db": "NVD",
"id": "CVE-2017-7914"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:rockwellautomation:panelview_plus_6_700-1500_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005222"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "99069"
}
],
"trust": 0.3
},
"cve": "CVE-2017-7914",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2017-7914",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-15839",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "b3d00c52-ffd5-41e3-accf-240483c08e12",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-116117",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"id": "CVE-2017-7914",
"impactScore": 4.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-7914",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2017-7914",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-15839",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201706-598",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "b3d00c52-ffd5-41e3-accf-240483c08e12",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-116117",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "b3d00c52-ffd5-41e3-accf-240483c08e12"
},
{
"db": "CNVD",
"id": "CNVD-2017-15839"
},
{
"db": "VULHUB",
"id": "VHN-116117"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005222"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-598"
},
{
"db": "NVD",
"id": "CVE-2017-7914"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access. A security vulnerability exists in Rockwell Automation PanelView Plus 6 700-1500 that caused the program to fail to perform authentication detection. The following versions are affected: Rockwell Automation PanelView Plus 6 700-1500 Version 6.00.04, Version 6.00.05, Version 6.00.42, Version 6.00-20140306, Version 6.10.20121012, Version 6.10-20140122, Version 7.00-20121012, Version 7.00- Vers, 7.00-20130325 version, 7.00-20130619 version, 7.00-20140128 version, 7.00-20140310 version, 7.00-20140429 version, 7.00-20140729 version, 7.00-20140729, 7.00-20140621 version, 7.00-20141022, 8.00-00. 20141023 version",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7914"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005222"
},
{
"db": "CNVD",
"id": "CNVD-2017-15839"
},
{
"db": "BID",
"id": "99069"
},
{
"db": "IVD",
"id": "b3d00c52-ffd5-41e3-accf-240483c08e12"
},
{
"db": "VULHUB",
"id": "VHN-116117"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-7914",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-157-01",
"trust": 2.8
},
{
"db": "BID",
"id": "99069",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201706-598",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-15839",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005222",
"trust": 0.8
},
{
"db": "IVD",
"id": "B3D00C52-FFD5-41E3-ACCF-240483C08E12",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-116117",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "b3d00c52-ffd5-41e3-accf-240483c08e12"
},
{
"db": "CNVD",
"id": "CNVD-2017-15839"
},
{
"db": "VULHUB",
"id": "VHN-116117"
},
{
"db": "BID",
"id": "99069"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005222"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-598"
},
{
"db": "NVD",
"id": "CVE-2017-7914"
}
]
},
"id": "VAR-201706-0662",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "b3d00c52-ffd5-41e3-accf-240483c08e12"
},
{
"db": "CNVD",
"id": "CNVD-2017-15839"
},
{
"db": "VULHUB",
"id": "VHN-116117"
}
],
"trust": 1.65
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "b3d00c52-ffd5-41e3-accf-240483c08e12"
},
{
"db": "CNVD",
"id": "CNVD-2017-15839"
}
]
},
"last_update_date": "2024-11-23T22:38:33.172000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "PanelView Plus 6 Graphic Terminals",
"trust": 0.8,
"url": "http://ab.rockwellautomation.com/graphic-terminals/2711p-panelview-plus-6-terminals"
},
{
"title": "Rockwell Automation PanelView Plus security bypass vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/98491"
},
{
"title": "Rockwell Automation PanelView Plus Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71488"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-15839"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005222"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-598"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-862",
"trust": 1.1
},
{
"problemtype": "CWE-882",
"trust": 1.0
},
{
"problemtype": "CWE-285",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-116117"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005222"
},
{
"db": "NVD",
"id": "CVE-2017-7914"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-157-01"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7914"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7914"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/99069"
},
{
"trust": 0.3,
"url": "http://www.rockwellautomation.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-15839"
},
{
"db": "VULHUB",
"id": "VHN-116117"
},
{
"db": "BID",
"id": "99069"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005222"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-598"
},
{
"db": "NVD",
"id": "CVE-2017-7914"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "b3d00c52-ffd5-41e3-accf-240483c08e12"
},
{
"db": "CNVD",
"id": "CNVD-2017-15839"
},
{
"db": "VULHUB",
"id": "VHN-116117"
},
{
"db": "BID",
"id": "99069"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005222"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-598"
},
{
"db": "NVD",
"id": "CVE-2017-7914"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-21T00:00:00",
"db": "IVD",
"id": "b3d00c52-ffd5-41e3-accf-240483c08e12"
},
{
"date": "2017-07-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-15839"
},
{
"date": "2017-06-14T00:00:00",
"db": "VULHUB",
"id": "VHN-116117"
},
{
"date": "2017-06-06T00:00:00",
"db": "BID",
"id": "99069"
},
{
"date": "2017-07-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005222"
},
{
"date": "2017-06-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-598"
},
{
"date": "2017-06-14T21:29:00.270000",
"db": "NVD",
"id": "CVE-2017-7914"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-15839"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-116117"
},
{
"date": "2017-06-06T00:00:00",
"db": "BID",
"id": "99069"
},
{
"date": "2017-07-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005222"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-598"
},
{
"date": "2024-11-21T03:32:57.230000",
"db": "NVD",
"id": "CVE-2017-7914"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-598"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell Automation PanelView Plus Security Bypass Vulnerability",
"sources": [
{
"db": "IVD",
"id": "b3d00c52-ffd5-41e3-accf-240483c08e12"
},
{
"db": "CNVD",
"id": "CNVD-2017-15839"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-598"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.