Rockwell Automation/Allen-Bradley Ethernet/IP Products Authentication Bypass

critical Nessus Network Monitor Plugin ID 720028

Synopsis

Rockwell Automation EtherNet/IP products allow an attacker to replay HTTP traffic.

Description

The web-server password-authentication functionality in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows man-in-the-middle attackers to conduct replay attacks via HTTP traffic.

Solution

Perform vendor recommended mitigations and apply available vendor upgrades.

See Also

http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf,https://ics-cert.us-cert.gov/advisories/ICSA-13-011-03

Plugin Details

Severity: Critical

ID: 720028

Family: SCADA

Published: 5/8/2019

Updated: 9/30/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Patch Publication Date: 1/10/2013

Vulnerability Publication Date: 1/10/2013

Reference Information

CVE: CVE-2012-6440