Rockwell ControlLogix Exposure of Sensitive Information to an Unauthorized Actor (CVE-2009-0474)

medium Tenable OT Security Plugin ID 500031

Synopsis

The remote OT asset is affected by a vulnerability.

Description

The web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allows remote attackers to obtain internal web page information and internal information about the module via unspecified vectors. NOTE: this may overlap CVE-2002-1603.

This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

http://www.nessus.org/u?c44a4fc4

http://www.kb.cert.org/vuls/id/124059

http://www.kb.cert.org/vuls/id/RGII-7MWKZ3

http://secunia.com/advisories/33783

http://www.vupen.com/english/advisories/2009/0347

Plugin Details

Severity: Medium

ID: 500031

Version: 1.6

Type: remote

Family: Tenable.ot

Published: 2/7/2022

Updated: 12/26/2023

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2009-0474

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:rockwellautomation:controllogix_1756-enbt%2fa_ethernet%2f_ip_bridge:-

Required KB Items: Tenable.ot/Rockwell

Exploit Ease: No known exploits are available

Patch Publication Date: 2/6/2009

Vulnerability Publication Date: 2/6/2009

Reference Information

CVE: CVE-2009-0474

CWE: 200

Secunia: 33783