Rockwell ControlLogix Link Following (CVE-2009-0473)

medium Tenable OT Security Plugin ID 500183

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Open redirect vulnerability in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

http://www.nessus.org/u?c44a4fc4

http://www.securityfocus.com/bid/33636

http://www.kb.cert.org/vuls/id/619499

http://secunia.com/advisories/33783

http://www.vupen.com/english/advisories/2009/0347

Plugin Details

Severity: Medium

ID: 500183

Version: 1.6

Type: remote

Family: Tenable.ot

Published: 2/7/2022

Updated: 12/14/2023

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2009-0473

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:rockwellautomation:controllogix_1756-enbt%2fa_ethernet%2f_ip_bridge:-

Required KB Items: Tenable.ot/Rockwell

Exploit Ease: No known exploits are available

Patch Publication Date: 2/6/2009

Vulnerability Publication Date: 2/6/2009

Reference Information

CVE: CVE-2009-0473

CWE: 59

Secunia: 33783