Rockwell Automation MicroLogix and CompactLogix Multiple Controllers Open Redirect

medium Nessus Network Monitor Plugin ID 720251

Synopsis

Rockwell Automation/Allen-Bradley MicroLogix 1400, MicroLogix 1100, CompactLogix 5370 L1, L2 and L3 controllers including CompactLogix GuardLogix are vulnerable to an open redirect that could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site that could run or download arbitrary malware on the user's machine.

Description

An open relay vulnerability exists in the embedded web servers in MicroLogix 1400, MicroLogix 1100, CompactLogix 5370 L1, L2 and L3 controllers including CompactLogix GuardLogix controllers. This vulnerability could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site that could run or download arbitrary malware on the user's machine.

Solution

Perform vendor recommended mitigations and apply available vendor upgrades.

See Also

https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1086288,https://ics-cert.us-cert.gov/advisories/ICSA-19-113-01

Plugin Details

Severity: Medium

ID: 720251

Family: SCADA

Published: 5/8/2019

Updated: 9/30/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 4/23/2019

Vulnerability Publication Date: 4/23/2019

Reference Information

CVE: CVE-2019-10955