var-201301-0154
Vulnerability from variot

Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 do not properly perform authentication for Ethernet firmware updates, which allows remote attackers to execute arbitrary code via a Trojan horse update image. Rockwell Automation MicroLogix is a programmable controller platform. The device incorrectly authenticates the user, allows the remote user to upload a new firmware image onto the Ethernet card, and does not check whether the firmware image is legitimate or corrupt, allowing an attacker to exploit the vulnerability to gain control of the device or crash the device. Rockwell's products are affected by this vulnerability: all EtherNet/IP products that comply with CIP and EtherNet/IP specifications

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201301-0154",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "1756-enbt",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "flexlogix 1788-enbt adapter",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "1768-eweb",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "compactlogix l35e controller",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "compactlogix l32e controller",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "1794-aentr flex i\\/o ethernet\\/ip adapter",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "compactlogix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "micrologix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "1400"
      },
      {
        "model": "guardlogix controllers",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "20"
      },
      {
        "model": "1768-enbt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "softlogix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "softlogix controllers",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "19"
      },
      {
        "model": "controllogix controllers",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "20"
      },
      {
        "model": "guardlogix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "compactlogix controllers",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "19"
      },
      {
        "model": "controllogix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "micrologix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "1100"
      },
      {
        "model": "1756-eweb",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": null
      },
      {
        "model": "1756-enbt",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "1756-eweb",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "1768-enbt",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "1768-eweb",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "compactlogix l32e controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "compactlogix l35e controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "compactlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "18"
      },
      {
        "model": "compactlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "19"
      },
      {
        "model": "controllogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "18"
      },
      {
        "model": "controllogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "20"
      },
      {
        "model": "flex i/o ethernet/ip adapter 1794-aentr",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "flexlogix 1788-enbt",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "guardlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "18"
      },
      {
        "model": "guardlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "20"
      },
      {
        "model": "micrologix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "1100"
      },
      {
        "model": "micrologix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "1400"
      },
      {
        "model": "softlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "18"
      },
      {
        "model": "softlogix controller",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "19"
      },
      {
        "model": "automation controllogix",
        "scope": null,
        "trust": 0.6,
        "vendor": "rockwell",
        "version": null
      },
      {
        "model": "automation micrologix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1100"
      },
      {
        "model": "automation micrologix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1400"
      },
      {
        "model": "compactlogix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "controllogix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "softlogix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": "guardlogix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "18"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "micrologix",
        "version": "*"
      },
      {
        "model": "automation softlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "19"
      },
      {
        "model": "automation softlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "18"
      },
      {
        "model": "automation micrologix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "14000"
      },
      {
        "model": "automation micrologix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "11000"
      },
      {
        "model": "automation guardlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "20"
      },
      {
        "model": "automation guardlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "18"
      },
      {
        "model": "automation compactlogix l35e",
        "scope": null,
        "trust": 0.3,
        "vendor": "rockwell",
        "version": null
      },
      {
        "model": "automation compactlogix l32e",
        "scope": null,
        "trust": 0.3,
        "vendor": "rockwell",
        "version": null
      },
      {
        "model": "automation compactlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "19"
      },
      {
        "model": "automation compactlogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "18"
      },
      {
        "model": "automation 1794-aentr",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": "automation 1788-enbt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": "automation 1768-eweb",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": "automation 1768-enbt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": "automation 1756-enbt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": "automation 1756-en2t series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "controllogix controllers",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "guardlogix controllers",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "softlogix controllers",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1756 enbt",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1756 eweb",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1768 enbt",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1768 eweb",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1794 aentr flex i o ethernet ip adapter",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "compactlogix",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "compactlogix controllers",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "compactlogix l32e controller",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "compactlogix l35e controller",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "controllogix",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "flexlogix 1788 enbt adapter",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "guardlogix",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "softlogix",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "BID",
        "id": "57317"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:rockwellautomation:1756-enbt",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:rockwellautomation:1756-eweb",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:rockwellautomation:1768-enbt",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:rockwellautomation:1768-eweb",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:rockwellautomation:compactlogix_l32e_controller",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:rockwellautomation:compactlogix_l35e_controller",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:compactlogix_controllers",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:controllogix_controllers",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:rockwellautomation:1794-aentr_flex_i%2Fo_ethernet%2Fip_adapter",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:rockwellautomation:flexlogix_1788-enbt_adapter",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:guardlogix_controllers",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:micrologix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:softlogix_controllers",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rub??n Santamarta",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2012-6437",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2012-6437",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "20403e12-2353-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-59718",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-6437",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-6437",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201301-460",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "20403e12-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-59718",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 do not properly perform authentication for Ethernet firmware updates, which allows remote attackers to execute arbitrary code via a Trojan horse update image. Rockwell Automation MicroLogix is a programmable controller platform. The device incorrectly authenticates the user, allows the remote user to upload a new firmware image onto the Ethernet card, and does not check whether the firmware image is legitimate or corrupt, allowing an attacker to exploit the vulnerability to gain control of the device or crash the device. Rockwell\u0027s products are affected by this vulnerability: all EtherNet/IP products that comply with CIP and EtherNet/IP specifications",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "BID",
        "id": "57317"
      },
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-6437",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-13-011-03",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "57317",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "20403E12-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-89568",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "db": "BID",
        "id": "57317"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      }
    ]
  },
  "id": "VAR-201301-0154",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      }
    ],
    "trust": 1.60856114
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:55:39.589000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.rockwellautomation.com/"
      },
      {
        "title": "Partner",
        "trust": 0.8,
        "url": "http://jp.rockwellautomation.com/applications/gs/ap/gsjp.nsf/pages/partner"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://jp.rockwellautomation.com/"
      },
      {
        "title": "Rockwell Automation ControlLogix Firmware Upload Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/29212"
      },
      {
        "title": "1768-ENBT_4.004.006",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45390"
      },
      {
        "title": "1756-EWEB_4.016",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45389"
      },
      {
        "title": "1756-ENBT_6.006",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45388"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-13-011-03.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6437"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6437"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/57317"
      },
      {
        "trust": 0.3,
        "url": "http://www.rockwellautomation.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "db": "BID",
        "id": "57317"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "db": "BID",
        "id": "57317"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-6437"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-01-17T00:00:00",
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2013-01-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "date": "2013-01-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "date": "2013-01-11T00:00:00",
        "db": "BID",
        "id": "57317"
      },
      {
        "date": "2013-01-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "date": "2013-01-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      },
      {
        "date": "2013-01-24T21:55:01.523000",
        "db": "NVD",
        "id": "CVE-2012-6437"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-05-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      },
      {
        "date": "2013-01-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-59718"
      },
      {
        "date": "2013-01-11T00:00:00",
        "db": "BID",
        "id": "57317"
      },
      {
        "date": "2013-01-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-001265"
      },
      {
        "date": "2013-01-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      },
      {
        "date": "2024-11-21T01:46:07.530000",
        "db": "NVD",
        "id": "CVE-2012-6437"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation ControlLogix Firmware upload vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "20403e12-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-00289"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201301-460"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…