mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-23 23:14:03 +02:00
28 lines
2.4 KiB
Markdown
28 lines
2.4 KiB
Markdown
### [CVE-2012-6440](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6440)
|
||

|
||

|
||

|
||

|
||

|
||

|
||

|
||

|
||

|
||

|
||

|
||

|
||

|
||
|
||
### Description
|
||
|
||
The Web server password authentication mechanism used by the products is vulnerable to a MitM and Replay attack. Successful exploitation of this vulnerability will allow unauthorized access of the product’s Web server to view and alter product configuration and diagnostics information.Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400
|
||
|
||
### POC
|
||
|
||
#### Reference
|
||
- https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03
|
||
|
||
#### Github
|
||
No PoCs found on GitHub currently.
|
||
|