CVE-2012-6439 Details

CVE-2012-6439

Published: 2013-01-24
Last Modified: 2013-01-25
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that modifies the (1) configuration or (2) network parameters.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 8.5/10
Exploit Score 10/10
Access Vector Network
Access Complexity Low
Authentication None
Impact Score 7.8/10
Confidentiality Impact None
Availability Impact Complete
Integrity Impact Partial
Vector String AV:N/AC:L/Au:N/C:N/I:P/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:rockwellautomation:controllogix_controllers:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rockwellautomation:guardlogix_controllers:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:rockwellautomation:softlogix_controllers:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:1756-enbt:-:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:1756-eweb:-:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:1768-enbt:-:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:1768-eweb:-:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:1794-aentr_flex_i\/o_ethernet\/ip_adapter:-:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:compactlogix:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:compactlogix_controllers:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:compactlogix_l32e_controller:-:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:compactlogix_l35e_controller:-:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:controllogix:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:flexlogix_1788-enbt_adapter:-:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:guardlogix:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:h:rockwellautomation:softlogix:*:*:*:*:*:*:*:* Yes - -
References

http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf

CVE ID
CVE-2012-6439
Published
2013-01-24
Modified
2013-01-25
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE Pending

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.