Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic function utilized to protect the password in MicroLogix is discoverable.
References
Link | Resource |
---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-070-06 | Third Party Advisory US Government Resource |
https://www.us-cert.gov/ics/advisories/icsa-20-070-06 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.us-cert.gov/ics/advisories/icsa-20-070-06 - Third Party Advisory, US Government Resource |
Information
Published : 2020-03-16 16:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-6984
Mitre link : CVE-2020-6984
CVE.ORG link : CVE-2020-6984
JSON object : View
Products Affected
rockwellautomation
- micrologix_1100_firmware
- micrologix_1400_a_firmware
- micrologix_1100
- micrologix_1400
- micrologix_1400_b_firmware
- rslogix_500
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm