Page 2 of 24 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

05 Apr 2018 — An exploitable denial of service vulnerability exists in the processing of snmp-set commands of the Allen Bradley Micrologix 1400 Series B FRN 21.2 and below. A specially crafted snmp-set request, when sent without associated firmware flashing snmp-set commands, can cause a device power cycle resulting in downtime for the device. An attacker can send one packet to trigger this vulnerability. Existe una vulnerabilidad explotable de denegación de servicio (DoS) en el procesamiento de comandos snmp-set de Alle... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0442 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.3EPSS: 3%CPEs: 2EXPL: 1

05 Apr 2018 — An exploitable insufficient resource pool vulnerability exists in the session communication functionality of Allen Bradley Micrologix 1400 Series B Firmware 21.2 and before. A specially crafted stream of packets can cause a flood of the session resource pool resulting in legitimate connections to the PLC being disconnected. An attacker can send unauthenticated packets to trigger this vulnerability. Existe una vulnerabilidad explotable de denegación de servicio (DoS) en la funcionalidad de comunicación de se... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0445 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 10.0EPSS: 12%CPEs: 2EXPL: 1

05 Apr 2018 — An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG (also RUN for some) Description: Allows an ... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 •

CVSS: 10.0EPSS: 12%CPEs: 2EXPL: 1

05 Apr 2018 — An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG Associated Fault Code: 0012 Fault Type: Non... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 •

CVSS: 10.0EPSS: 15%CPEs: 2EXPL: 1

05 Apr 2018 — An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability.Required Keyswitch State: REMOTE or PROG Associated Fault Code: 0001 Fault Type: Non-... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 •

CVSS: 10.0EPSS: 37%CPEs: 2EXPL: 1

05 Apr 2018 — An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE Description: Any input or output can be forced, cau... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 •

CVSS: 10.0EPSS: 42%CPEs: 2EXPL: 1

05 Apr 2018 — An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG Description: The filetype 0x03 allows users... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 •

CVSS: 10.0EPSS: 61%CPEs: 2EXPL: 1

05 Apr 2018 — An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE Description: Live rung edits are able to be made by... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 •

CVSS: 10.0EPSS: 42%CPEs: 2EXPL: 1

05 Apr 2018 — An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG Description: This ability is leveraged in a... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 •

CVSS: 10.0EPSS: 15%CPEs: 2EXPL: 1

05 Apr 2018 — An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG Associated Fault Code: 0028 Fault Type: Non... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443 •