Lucene search

K
cveIcscertCVE-2020-6990
HistoryMar 16, 2020 - 4:15 p.m.

CVE-2020-6990

2020-03-1616:15:14
CWE-798
CWE-321
icscert
web.nvd.nist.gov
38
cve-2020-6990
rockwell automation
micrologix controllers
rslogix 500 software
cryptographic key
remote access
security vulnerability

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.024

Percentile

89.9%

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic key utilized to help protect the account password is hard coded into the RSLogix 500 binary file. An attacker could identify cryptographic keys and use it for further cryptographic attacks that could ultimately lead to a remote attacker gaining unauthorized access to the controller.

Affected configurations

Nvd
Node
rockwellautomationmicrologix_1400_a_firmware
OR
rockwellautomationmicrologix_1400_b_firmwareRange21.001
AND
rockwellautomationmicrologix_1400Match-
Node
rockwellautomationmicrologix_1100_firmware
AND
rockwellautomationmicrologix_1100Match-
Node
rockwellautomationrslogix_500Range12.001
VendorProductVersionCPE
rockwellautomationmicrologix_1400_a_firmware*cpe:2.3:o:rockwellautomation:micrologix_1400_a_firmware:*:*:*:*:*:*:*:*
rockwellautomationmicrologix_1400_b_firmware*cpe:2.3:o:rockwellautomation:micrologix_1400_b_firmware:*:*:*:*:*:*:*:*
rockwellautomationmicrologix_1400-cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*
rockwellautomationmicrologix_1100_firmware*cpe:2.3:o:rockwellautomation:micrologix_1100_firmware:*:*:*:*:*:*:*:*
rockwellautomationmicrologix_1100-cpe:2.3:h:rockwellautomation:micrologix_1100:-:*:*:*:*:*:*:*
rockwellautomationrslogix_500*cpe:2.3:a:rockwellautomation:rslogix_500:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior"
      }
    ]
  }
]

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.024

Percentile

89.9%