漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE or PROG Associated Fault Codes: 0023, 002e, and 0037 Fault Type: Recoverable Description: The STI, EII, and HSC function files contain bits signifying whether or not a fault has occurred. Additionally there is a bit signaling the module to auto start. When these bits are set for any of the three modules and the device is moved into a run state, a fault is triggered.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Rockwell Automation Allen Bradley Micrologix 1400 Series B 访问控制错误漏洞
Vulnerability Description
Rockwell Automation Allen Bradley Micrologix 1400 Series B是美国罗克韦尔(Rockwell Automation)公司的一款可编程逻辑控制器。 使用21.2及之前版本固件的Rockwell Automation Allen Bradley Micrologix 1400 Series B中的数据、程序和函数文件权限功能存在访问控制错误漏洞。远程攻击者可通过发送特制的数据包利用该漏洞执行写入和读取操作,进而泄露敏感信息,修改设置或梯形逻辑。
CVSS Information
N/A
Vulnerability Type
N/A