var-201706-0657
Vulnerability from variot

A "Reusing a Nonce, Key Pair in Encryption" issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected product reuses nonces, which may allow an attacker to capture and replay a valid request until the nonce is changed. Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 The controller contains a cryptographic vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Rockwell Automation Allen-Bradley MicroLogix 1100 1763-L16AWA Series A is a programmable logic controller (PLC) product from Rockwell Automation. Security vulnerabilities exist in several Rockwell Automation products. An attacker could exploit this vulnerability to capture and respond to valid requests. Attackers may exploit these issues to bypass authentication mechanism, bypass security restrictions and perform unauthorized actions, gain sensitive information and cause denial-of-service conditions

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0657",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "1766-l32awa series b",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32awaa series b",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bxba series a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bxb series b",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bwa series a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bxb series a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1763-l16bbb series b",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bxba series b",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1763-l16bwa series a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32awaa series a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32awa series a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1763-l16dwd series a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1763-l16bbb series a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1763-l16awa series b",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1763-l16awa series a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bwa series b",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1763-l16bwa series b",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1763-l16dwd series b",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bwaa series b",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bwaa series a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "allen-bradley micrologix 1100 1763-l16awa series a",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1100 1763-l16awa series b",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1100 1763-l16bbb series a",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1100 1763-l16bbb series b",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1100 1763-l16bwa series a",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1100 1763-l16bwa series b",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1100 1763-l16dwd series a",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1100 1763-l16dwd series b",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32awa series a",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32awa series b",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32awaa series a",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32awaa series b",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32bwa series a",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32bwa series b",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32bwaa series a",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32bwaa series b",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32bxb series a",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32bxb series b",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32bxba series a",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "allen-bradley micrologix 1400 1766-l32bxba series b",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "16.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16awa",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1100\u003c=16.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bbb",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1100\u003c=16.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bwa",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1100\u003c=16.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16dwd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1100\u003c=16.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awa",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1400\u003c=16.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwa",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1400\u003c=16.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwaa",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1400\u003c=16.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxb",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1400\u003c=16.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxba",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1400\u003c=16.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awaa",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "1400\u003c=16.00"
      },
      {
        "model": "1766-l32bwaa series b",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bxb series b",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32awa series b",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bwa series b",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bwaa series a",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bxba series a",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bwa series a",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32awa series a",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bxb series a",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "1766-l32bxba series b",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "16.000"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxba series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxba series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxba series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxba series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxb series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxb series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxb series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxb series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwaa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwaa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwaa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwaa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awaa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awaa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awaa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awaa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140015.004"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16dwd series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16dwd series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110015.000"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16dwd series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110014.000"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16dwd series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16dwd series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110014.000"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bwa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bwa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110015.000"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bwa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110014.000"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bwa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bwa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110014.000"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bbb series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bbb series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110015.000"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bbb series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110014.000"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bbb series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16bbb series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110014.000"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16awa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16awa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110015.000"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16awa series b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110014.000"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16awa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110016.00"
      },
      {
        "model": "automation allen-bradley micrologix 1763-l16awa series a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "110014.000"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxba series b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140021.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bxb series b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140021.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwaa series b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140021.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32bwa series b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140021.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awaa series b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140021.00"
      },
      {
        "model": "automation allen-bradley micrologix 1766-l32awa series b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "140021.00"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1763 l16awa series a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1763 l16awa series b",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1763 l16bbb series a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1763 l16bbb series b",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1763 l16bwa series a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1763 l16bwa series b",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1763 l16dwd series a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1763 l16dwd series b",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32awa series a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32awa series b",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32awaa series a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32awaa series b",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32bwa series a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32bwa series b",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32bwaa series a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32bwaa series b",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32bxb series a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32bxb series b",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32bxba series a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "1766 l32bxba series b",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "39a0941d-3488-4dbf-908a-9e36af02ceef"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-08713"
      },
      {
        "db": "BID",
        "id": "98630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1233"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7902"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1763-l16awa_series_a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1763-l16awa_series_b",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1763-l16bbb_series_a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1763-l16bbb_series_b",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1763-l16bwa_series_a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1763-l16bwa_series_b",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1763-l16dwd_series_a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1763-l16dwd_series_b",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32awa_series_a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32awa_series_b",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32awaa_series_a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32awaa_series_b",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bwa_series_a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bwa_series_b",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bwaa_series_a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bwaa_series_b",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bxb_series_a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bxb_series_b",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bxba_series_a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bxba_series_b",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Maxim Rupp",
    "sources": [
      {
        "db": "BID",
        "id": "98630"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1233"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2017-7902",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-7902",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-08713",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "39a0941d-3488-4dbf-908a-9e36af02ceef",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-116105",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-7902",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-7902",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-7902",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-08713",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201705-1233",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "39a0941d-3488-4dbf-908a-9e36af02ceef",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-116105",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "39a0941d-3488-4dbf-908a-9e36af02ceef"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-08713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116105"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1233"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7902"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A \"Reusing a Nonce, Key Pair in Encryption\" issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected product reuses nonces, which may allow an attacker to capture and replay a valid request until the nonce is changed. Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 The controller contains a cryptographic vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Rockwell Automation Allen-Bradley MicroLogix 1100 1763-L16AWA Series A is a programmable logic controller (PLC) product from Rockwell Automation. Security vulnerabilities exist in several Rockwell Automation products. An attacker could exploit this vulnerability to capture and respond to valid requests. \nAttackers may exploit these issues to bypass authentication mechanism,  bypass security restrictions and perform unauthorized actions, gain  sensitive information and cause denial-of-service conditions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-7902"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-08713"
      },
      {
        "db": "BID",
        "id": "98630"
      },
      {
        "db": "IVD",
        "id": "39a0941d-3488-4dbf-908a-9e36af02ceef"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116105"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-7902",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-115-04",
        "trust": 3.4
      },
      {
        "db": "SECTRACK",
        "id": "1038546",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1233",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "98630",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-08713",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005258",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "39A0941D-3488-4DBF-908A-9E36AF02CEEF",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-116105",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "39a0941d-3488-4dbf-908a-9e36af02ceef"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-08713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116105"
      },
      {
        "db": "BID",
        "id": "98630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1233"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7902"
      }
    ]
  },
  "id": "VAR-201706-0657",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "39a0941d-3488-4dbf-908a-9e36af02ceef"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-08713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116105"
      }
    ],
    "trust": 1.709478032
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "39a0941d-3488-4dbf-908a-9e36af02ceef"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-08713"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:40:57.534000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.rockwellautomation.com/"
      },
      {
        "title": "Patches for Unknown Vulnerabilities (CNVD-2017-08713) for Multiple Rockwell Automation Products",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/94975"
      },
      {
        "title": "Multiple Rockwell Automation Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70575"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-08713"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1233"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-330",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-323",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-310",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-116105"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7902"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-115-04"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1038546"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7902"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7902"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/98630"
      },
      {
        "trust": 0.3,
        "url": "http://www.moxa.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-08713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116105"
      },
      {
        "db": "BID",
        "id": "98630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1233"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7902"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "39a0941d-3488-4dbf-908a-9e36af02ceef"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-08713"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116105"
      },
      {
        "db": "BID",
        "id": "98630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1233"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7902"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-06-08T00:00:00",
        "db": "IVD",
        "id": "39a0941d-3488-4dbf-908a-9e36af02ceef"
      },
      {
        "date": "2017-06-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-08713"
      },
      {
        "date": "2017-06-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116105"
      },
      {
        "date": "2017-05-23T00:00:00",
        "db": "BID",
        "id": "98630"
      },
      {
        "date": "2017-07-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      },
      {
        "date": "2017-05-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201705-1233"
      },
      {
        "date": "2017-06-30T03:29:00.827000",
        "db": "NVD",
        "id": "CVE-2017-7902"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-06-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-08713"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116105"
      },
      {
        "date": "2017-05-23T00:00:00",
        "db": "BID",
        "id": "98630"
      },
      {
        "date": "2017-07-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      },
      {
        "date": "2019-10-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201705-1233"
      },
      {
        "date": "2024-11-21T03:32:55.810000",
        "db": "NVD",
        "id": "CVE-2017-7902"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1233"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation Allen-Bradley MicroLogix 1100 and  1400 Cryptographic vulnerability in the controller",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005258"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "security feature problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-1233"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…