漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A "Reusing a Nonce, Key Pair in Encryption" issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected product reuses nonces, which may allow an attacker to capture and replay a valid request until the nonce is changed.
漏洞信息
N/A
漏洞
在加密中重用Nonce与密钥对
漏洞
多款Rockwell Automation产品安全漏洞
漏洞信息
Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA等都是美国罗克韦尔(Rockwell Automation)公司的可编程逻辑控制器(PLC)产品。 多款Rockwell Automation产品中存在安全漏洞,该漏洞源于程序重复使用nounce。攻击者可利用该漏洞截图和重播有效请求。以下产品和版本受到影响:Allen-Bradley MicroLogix 1100 pro
漏洞信息
N/A
漏洞
N/A