Files
CVEs-PoC/2021/CVE-2021-33012.md
2025-09-29 21:09:30 +02:00

19 lines
954 B
Markdown

### [CVE-2021-33012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33012)
![](https://img.shields.io/static/v1?label=Product&message=Rockwell%20Automation%20MicroLogix%201100&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=All%20Versions%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=IMPROPER%20INPUT%20VALIDATION%20CWE-20&color=brightgreen)
### Description
Rockwell Automation MicroLogix 1100, all versions, allows a remote, unauthenticated attacker sending specially crafted commands to cause the PLC to fault when the controller is switched to RUN mode, which results in a denial-of-service condition. If successfully exploited, this vulnerability will cause the controller to fault whenever the controller is switched to RUN mode.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/btaub/industrial