// For flags

CVE-2018-17924

 

Severity Score

8.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.

Rockwell Automation MicroLogix 1400 Controllers y 1756 ControlLogix Communications Modules. Un actor de amenaza remoto no autenticado podría enviar una petición de conexión CIP a un dispositivo afectado y, tras conectarse exitosamente, enviar una nueva configuración IP al dispositivo afectado incluso aunque el controlador en el sistema esté configurado en modo Hard RUN. Cuando el dispositivo afectado acepta esta nueva configuración IP, ocurre una pérdida de comunicación entre el dispositivo y el resto del sistema, ya que el tráfico del sistema sigue intentando comunicarse con el dispositivo mediante la dirección IP sobrescrita.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-10-02 CVE Reserved
  • 2018-12-07 CVE Published
  • 2024-02-07 First Exploit
  • 2024-04-29 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-306: Missing Authentication for Critical Function
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rockwellautomation
Search vendor "Rockwellautomation"
Micrologix 1400 Firmware
Search vendor "Rockwellautomation" for product "Micrologix 1400 Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
Micrologix 1400
Search vendor "Rockwellautomation" for product "Micrologix 1400"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-enbt Firmware
Search vendor "Rockwellautomation" for product "1756-enbt Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-enbt
Search vendor "Rockwellautomation" for product "1756-enbt"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-eweb Series A Firmware
Search vendor "Rockwellautomation" for product "1756-eweb Series A Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-eweb Series A
Search vendor "Rockwellautomation" for product "1756-eweb Series A"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-eweb Series B Firmware
Search vendor "Rockwellautomation" for product "1756-eweb Series B Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-eweb Series B
Search vendor "Rockwellautomation" for product "1756-eweb Series B"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2f Series A Firmware
Search vendor "Rockwellautomation" for product "1756-en2f Series A Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2f Series A
Search vendor "Rockwellautomation" for product "1756-en2f Series A"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2f Series B Firmware
Search vendor "Rockwellautomation" for product "1756-en2f Series B Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2f Series B
Search vendor "Rockwellautomation" for product "1756-en2f Series B"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2f Series C Firmware
Search vendor "Rockwellautomation" for product "1756-en2f Series C Firmware"
<= 10.10
Search vendor "Rockwellautomation" for product "1756-en2f Series C Firmware" and version " <= 10.10"
-
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2f Series C
Search vendor "Rockwellautomation" for product "1756-en2f Series C"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2t Series A Firmware
Search vendor "Rockwellautomation" for product "1756-en2t Series A Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2t Series A
Search vendor "Rockwellautomation" for product "1756-en2t Series A"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2t Series B Firmware
Search vendor "Rockwellautomation" for product "1756-en2t Series B Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2t Series B
Search vendor "Rockwellautomation" for product "1756-en2t Series B"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2t Series C Firmware
Search vendor "Rockwellautomation" for product "1756-en2t Series C Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2t Series C
Search vendor "Rockwellautomation" for product "1756-en2t Series C"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2t Series D Firmware
Search vendor "Rockwellautomation" for product "1756-en2t Series D Firmware"
<= 10.10
Search vendor "Rockwellautomation" for product "1756-en2t Series D Firmware" and version " <= 10.10"
-
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2t Series D
Search vendor "Rockwellautomation" for product "1756-en2t Series D"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2tr Series A Firmware
Search vendor "Rockwellautomation" for product "1756-en2tr Series A Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2tr Series A
Search vendor "Rockwellautomation" for product "1756-en2tr Series A"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2tr Series B Firmware
Search vendor "Rockwellautomation" for product "1756-en2tr Series B Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2tr Series B
Search vendor "Rockwellautomation" for product "1756-en2tr Series B"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2tr Series C Firmware
Search vendor "Rockwellautomation" for product "1756-en2tr Series C Firmware"
<= 10.10
Search vendor "Rockwellautomation" for product "1756-en2tr Series C Firmware" and version " <= 10.10"
-
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en2tr Series C
Search vendor "Rockwellautomation" for product "1756-en2tr Series C"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en3tr Series A Firmware
Search vendor "Rockwellautomation" for product "1756-en3tr Series A Firmware"
--
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en3tr Series A
Search vendor "Rockwellautomation" for product "1756-en3tr Series A"
--
Safe
Rockwellautomation
Search vendor "Rockwellautomation"
1756-en3tr Series B Firmware
Search vendor "Rockwellautomation" for product "1756-en3tr Series B Firmware"
<= 10.10
Search vendor "Rockwellautomation" for product "1756-en3tr Series B Firmware" and version " <= 10.10"
-
Affected
in Rockwellautomation
Search vendor "Rockwellautomation"
1756-en3tr Series B
Search vendor "Rockwellautomation" for product "1756-en3tr Series B"
--
Safe