Page 40 of 241 results (0.008 seconds)

CVSS: 7.0EPSS: 0%CPEs: 9EXPL: 0

A DLL Hijack issue was discovered in Rockwell Automation Connected Components Workbench (CCW). The following versions are affected: Connected Components Workbench - Developer Edition, v9.01.00 and earlier: 9328-CCWDEVENE, 9328-CCWDEVZHE, 9328-CCWDEVFRE, 9328-CCWDEVITE, 9328-CCWDEVDEE, 9328-CCWDEVESE, and 9328-CCWDEVPTE; and Connected Components Workbench - Free Standard Edition (All Supported Languages), v9.01.00 and earlier. Certain DLLs included with versions of CCW software can be potentially hijacked to allow an attacker to gain rights to a victim's affected personal computer. Such access rights can be at the same or potentially higher level of privileges as the compromised user account, including and up to computer administrator privileges. Se detectó un problema de secuestro de DLL en Connected Components Workbench (CCW) de Rockwell Automation. • http://www.securityfocus.com/bid/97000 https://ics-cert.us-cert.gov/advisories/ICSA-17-047-01 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.1EPSS: 0%CPEs: 8EXPL: 0

A Resource Exhaustion issue was discovered in Rockwell Automation ControlLogix 5580 controllers V28.011, V28.012, and V28.013; ControlLogix 5580 controllers V29.011; CompactLogix 5380 controllers V28.011; and CompactLogix 5380 controllers V29.011. This vulnerability may allow an attacker to cause a denial of service condition by sending a series of specific CIP-based commands to the controller. Se ha descubierto un problema de agotamiento de recursos en Rockwell Automation ControlLogix 5580 en los controladores V28.011, V28.012 y V28.013. • http://www.securityfocus.com/bid/98309 https://ics-cert.us-cert.gov/advisories/ICSA-17-094-05 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 10.0EPSS: 0%CPEs: 101EXPL: 0

An issue was discovered in Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 through 21.00 (excluding all firmware versions prior to FRN 16.00, which are not affected). By sending malformed common industrial protocol (CIP) packet, an attacker may be able to overflow a stack-based buffer and execute code on the controller or initiate a nonrecoverable fault resulting in a denial of service. Ha sido descubierto un problema en Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 a 21.00 (excluyendo todas las versiones de firmware anteriores a FRN 16.00, que no se ven afectadas). Al enviar un paquete de protocolo industrial común (CIP) malformado, un atacante puede realizar un desbordamiento de búfer basado en pila y ejecutar código en el controlador o iniciar un fallo irrecuperable que da como resultado una denegación de servicio. • http://www.securityfocus.com/bid/95304 https://ics-cert.us-cert.gov/advisories/ICSA-16-343-05 • CWE-787: Out-of-bounds Write •

CVSS: 4.0EPSS: 0%CPEs: 20EXPL: 0

An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. Because of an Incorrect Permission Assignment for Critical Resource, users with administrator privileges may be able to remove all administrative users requiring a factory reset to restore ancillary web server function. Exploitation of this vulnerability will still allow the affected device to function in its capacity as a controller. Ha sido descubierto un problema en controlador Rockwell Automation Allen-Bradley MicroLogix 1100, 1763-L16AWA, Serie A y B, Versión 14.000 y versiones anteriores; 1763-L16BBB, Serie A y B, Versión 14.000 y versiones anteriores; 1763-L16BWA, Serie A y B, Versión 14.000 y versiones anteriores; y 1763-L16DWD, Serie A y B, Versión 14.000 y versiones anteriores. Debido a una asignación de permisos incorrecta para recursos críticos, los usuarios con privilegios de administrador pueden eliminar todos los usuarios administrativos requiriéndose un restablecimiento de fábrica para restaurar la función del servidor web auxiliar. • http://www.securityfocus.com/bid/95302 https://ics-cert.us-cert.gov/advisories/ICSA-16-336-06 •

CVSS: 7.3EPSS: 0%CPEs: 20EXPL: 0

An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. User credentials are sent to the web server in clear text, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server. Ha sido descubierto un problema en controlador Rockwell Automation Allen-Bradley MicroLogix 1100, 1763-L16AWA, 1763-L16AWA, Series A y B, Versión 14.000 y versiones anteriores; 1763-L16BBB, Series A y B, Versión 14.000 y versiones anteriores; 1763-L16BWA, Series A y B, Versión 14.000 y versiones anteriores; y 1763-L16DWD, Series A y B, Versión 14.000 y versiones anteriores. Las credenciales de usuario son enviadas al servidor web en texto plano, lo que puede permitir a un atacante descubrir las credenciales si son capaces de observar el tráfico entre el navegador web y el servidor. • http://www.securityfocus.com/bid/95302 https://ics-cert.us-cert.gov/advisories/ICSA-16-336-06 •