漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
Rockwell Automation ControlLogix PLC Improper Input Validation
漏洞信息
The Web server password authentication mechanism used by the products is vulnerable to a MitM and Replay attack. Successful exploitation of this vulnerability will allow unauthorized access of the product’s Web server to view and alter product configuration and diagnostics information. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400
漏洞信息
N/A
漏洞
认证机制不恰当
漏洞
Rockwell Automation ControlLogix 重放安全绕过漏洞
漏洞信息
Rockwell Automation ControlLogix提供工业自动化控制和信息产品。 Rockwell Automation ControlLogix中存在安全绕过漏洞。攻击者利用该漏洞绕过一定的安全限制,执行未授权操作,有助于进一步攻击。
漏洞信息
N/A
漏洞
N/A