Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to obtain sensitive information via a crafted CIP packet.
References
Link | Resource |
---|---|
http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2013-01-24 21:55
Updated : 2024-02-04 18:16
NVD link : CVE-2012-6441
Mitre link : CVE-2012-6441
CVE.ORG link : CVE-2012-6441
JSON object : View
Products Affected
rockwellautomation
- guardlogix_controllers
- 1794-aentr_flex_i\/o_ethernet\/ip_adapter
- guardlogix
- softlogix
- controllogix
- 1768-eweb
- 1756-eweb
- 1768-enbt
- micrologix
- compactlogix
- compactlogix_l32e_controller
- softlogix_controllers
- compactlogix_controllers
- flexlogix_1788-enbt_adapter
- compactlogix_l35e_controller
- 1756-enbt
- controllogix_controllers
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor