Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2018-17924First vendor Publication2018-12-07
VendorCveLast vendor Modification2019-01-04

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score7.8Attack RangeNetwork
Cvss Impact Score6.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17924

CWE : Common Weakness Enumeration

%idName
100 %CWE-306Missing Authentication for Critical Function (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Os1
Os1
Os1
Os1
Os1
Os1
Os1
Os1
Os1
Os1
Os1
Os1
Os1
Os1
Os1
Os1

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/106132
MISC https://ics-cert.us-cert.gov/advisories/ICSA-18-310-02

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2019-01-04 17:19:58
  • Multiple Updates
2018-12-08 17:19:05
  • Multiple Updates
2018-12-07 17:19:14
  • First insertion