var-201706-0658
Vulnerability from variot
A Weak Password Requirements issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected products use a numeric password with a small maximum character size for the password. Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 The controller contains a cryptographic strength vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Rockwell Automation Allen-Bradley MicroLogix 1100 1763-L16AWA Series A is a programmable logic controller (PLC) product from Rockwell Automation. Security vulnerabilities exist in several Rockwell Automation products. An attacker could exploit the vulnerability to gain unauthorized access to the affected device. Attackers may exploit these issues to bypass authentication mechanism, bypass security restrictions and perform unauthorized actions, gain sensitive information and cause denial-of-service conditions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0658",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "1766-l32awa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32awaa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bxba series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bxb series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bwa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bxb series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1763-l16bbb series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bxba series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1763-l16bwa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32awaa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32awa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1763-l16dwd series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1763-l16bbb series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1763-l16awa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1763-l16awa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bwa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1763-l16bwa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1763-l16dwd series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bwaa series b",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bwaa series a",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "allen-bradley micrologix 1100 1763-l16awa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1100 1763-l16awa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1100 1763-l16bbb series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1100 1763-l16bbb series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1100 1763-l16bwa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1100 1763-l16bwa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1100 1763-l16dwd series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1100 1763-l16dwd series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32awa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32awa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32awaa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32awaa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bwa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bwa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bwaa series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bwaa series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bxb series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bxb series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bxba series a",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "allen-bradley micrologix 1400 1766-l32bxba series b",
"scope": "lte",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "16.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16awa",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1100\u003c=16.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16bbb",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1100\u003c=16.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16bwa",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1100\u003c=16.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16dwd",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1100\u003c=16.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32awa",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1400\u003c=16.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwa",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1400\u003c=16.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwaa",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1400\u003c=16.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxb",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1400\u003c=16.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxba",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1400\u003c=16.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32awaa",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1400\u003c=16.00"
},
{
"model": "1766-l32bwaa series b",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bxb series b",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32awa series b",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bwa series b",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bwaa series a",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bxba series a",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bwa series a",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32awa series a",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bxb series a",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "1766-l32bxba series b",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwellautomation",
"version": "16.000"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxba series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxba series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxba series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxba series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxb series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxb series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxb series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxb series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwaa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwaa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwaa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwaa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32awaa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32awaa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32awaa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32awaa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32awa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32awa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1766-l32awa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140016.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32awa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "140015.004"
},
{
"model": "automation allen-bradley micrologix 1763-l16dwd series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110016.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16dwd series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110015.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16dwd series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16dwd series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110016.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16dwd series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bwa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110016.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16bwa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110015.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bwa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bwa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110016.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16bwa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bbb series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110016.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16bbb series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110015.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bbb series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16bbb series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110016.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16bbb series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16awa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110016.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16awa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110015.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16awa series b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1763-l16awa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110016.00"
},
{
"model": "automation allen-bradley micrologix 1763-l16awa series a",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "110014.000"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxba series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140021.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bxb series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140021.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwaa series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140021.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32bwa series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140021.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32awaa series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140021.00"
},
{
"model": "automation allen-bradley micrologix 1766-l32awa series b",
"scope": "ne",
"trust": 0.3,
"vendor": "rockwell",
"version": "140021.00"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16awa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16awa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16bbb series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16bbb series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16bwa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16bwa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16dwd series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1763 l16dwd series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32awa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32awa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32awaa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32awaa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bwa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bwa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bwaa series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bwaa series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bxb series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bxb series b",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bxba series a",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "1766 l32bxba series b",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "d8eaab08-91a4-49b0-87ae-dc64ea9581a3"
},
{
"db": "CNVD",
"id": "CNVD-2017-08710"
},
{
"db": "BID",
"id": "98630"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005259"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1236"
},
{
"db": "NVD",
"id": "CVE-2017-7903"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:rockwellautomation:1763-l16awa_series_a",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1763-l16awa_series_b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1763-l16bbb_series_a",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1763-l16bbb_series_b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1763-l16bwa_series_a",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1763-l16bwa_series_b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1763-l16dwd_series_a",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1763-l16dwd_series_b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32awa_series_a",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32awa_series_b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32awaa_series_a",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32awaa_series_b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bwa_series_a",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bwa_series_b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bwaa_series_a",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bwaa_series_b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bxb_series_a",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bxb_series_b",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bxba_series_a",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:rockwellautomation:1766-l32bxba_series_b",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005259"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Maxim Rupp",
"sources": [
{
"db": "BID",
"id": "98630"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1236"
}
],
"trust": 0.9
},
"cve": "CVE-2017-7903",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2017-7903",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-08710",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "d8eaab08-91a4-49b0-87ae-dc64ea9581a3",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-116106",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2017-7903",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-7903",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2017-7903",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2017-08710",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201705-1236",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "d8eaab08-91a4-49b0-87ae-dc64ea9581a3",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-116106",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "d8eaab08-91a4-49b0-87ae-dc64ea9581a3"
},
{
"db": "CNVD",
"id": "CNVD-2017-08710"
},
{
"db": "VULHUB",
"id": "VHN-116106"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005259"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1236"
},
{
"db": "NVD",
"id": "CVE-2017-7903"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Weak Password Requirements issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected products use a numeric password with a small maximum character size for the password. Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 The controller contains a cryptographic strength vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Rockwell Automation Allen-Bradley MicroLogix 1100 1763-L16AWA Series A is a programmable logic controller (PLC) product from Rockwell Automation. Security vulnerabilities exist in several Rockwell Automation products. An attacker could exploit the vulnerability to gain unauthorized access to the affected device. \nAttackers may exploit these issues to bypass authentication mechanism, bypass security restrictions and perform unauthorized actions, gain sensitive information and cause denial-of-service conditions",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7903"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005259"
},
{
"db": "CNVD",
"id": "CNVD-2017-08710"
},
{
"db": "BID",
"id": "98630"
},
{
"db": "IVD",
"id": "d8eaab08-91a4-49b0-87ae-dc64ea9581a3"
},
{
"db": "VULHUB",
"id": "VHN-116106"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-7903",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-115-04",
"trust": 3.4
},
{
"db": "BID",
"id": "98630",
"trust": 1.5
},
{
"db": "SECTRACK",
"id": "1038546",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1236",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-08710",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005259",
"trust": 0.8
},
{
"db": "NSFOCUS",
"id": "36798",
"trust": 0.6
},
{
"db": "IVD",
"id": "D8EAAB08-91A4-49B0-87AE-DC64EA9581A3",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-116106",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "d8eaab08-91a4-49b0-87ae-dc64ea9581a3"
},
{
"db": "CNVD",
"id": "CNVD-2017-08710"
},
{
"db": "VULHUB",
"id": "VHN-116106"
},
{
"db": "BID",
"id": "98630"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005259"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1236"
},
{
"db": "NVD",
"id": "CVE-2017-7903"
}
]
},
"id": "VAR-201706-0658",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "d8eaab08-91a4-49b0-87ae-dc64ea9581a3"
},
{
"db": "CNVD",
"id": "CNVD-2017-08710"
},
{
"db": "VULHUB",
"id": "VHN-116106"
}
],
"trust": 1.709478032
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "d8eaab08-91a4-49b0-87ae-dc64ea9581a3"
},
{
"db": "CNVD",
"id": "CNVD-2017-08710"
}
]
},
"last_update_date": "2024-11-23T21:40:57.703000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.rockwellautomation.com/"
},
{
"title": "Patches for unknown Rockwell Automation products with unknown vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/94972"
},
{
"title": "Multiple Rockwell Automation Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70578"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-08710"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005259"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1236"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-326",
"trust": 1.9
},
{
"problemtype": "CWE-521",
"trust": 1.0
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-116106"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005259"
},
{
"db": "NVD",
"id": "CVE-2017-7903"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-115-04"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/bid/98630"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1038546"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7903"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7903"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/36798"
},
{
"trust": 0.3,
"url": "http://www.moxa.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-08710"
},
{
"db": "VULHUB",
"id": "VHN-116106"
},
{
"db": "BID",
"id": "98630"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005259"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1236"
},
{
"db": "NVD",
"id": "CVE-2017-7903"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "d8eaab08-91a4-49b0-87ae-dc64ea9581a3"
},
{
"db": "CNVD",
"id": "CNVD-2017-08710"
},
{
"db": "VULHUB",
"id": "VHN-116106"
},
{
"db": "BID",
"id": "98630"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005259"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1236"
},
{
"db": "NVD",
"id": "CVE-2017-7903"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-08T00:00:00",
"db": "IVD",
"id": "d8eaab08-91a4-49b0-87ae-dc64ea9581a3"
},
{
"date": "2017-06-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-08710"
},
{
"date": "2017-06-30T00:00:00",
"db": "VULHUB",
"id": "VHN-116106"
},
{
"date": "2017-05-23T00:00:00",
"db": "BID",
"id": "98630"
},
{
"date": "2017-07-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005259"
},
{
"date": "2017-05-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201705-1236"
},
{
"date": "2017-06-30T03:29:00.860000",
"db": "NVD",
"id": "CVE-2017-7903"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-08710"
},
{
"date": "2017-07-08T00:00:00",
"db": "VULHUB",
"id": "VHN-116106"
},
{
"date": "2017-05-23T00:00:00",
"db": "BID",
"id": "98630"
},
{
"date": "2017-07-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005259"
},
{
"date": "2017-07-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201705-1236"
},
{
"date": "2024-11-21T03:32:55.943000",
"db": "NVD",
"id": "CVE-2017-7903"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201705-1236"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 Vulnerability related to cryptographic strength in the controller",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005259"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201705-1236"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.