Executive Summary

NameCVE-2018-17924First vendor Publication2018-12-07
VendorCveLast vendor Modification2018-12-08

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base ScoreNot DefinedAttack RangeNot Defined
Cvss Impact ScoreNot DefinedAttack ComplexityNot Defined
Cvss Expoit ScoreNot DefinedAuthenticationNot Defined
Calculate full CVSS 2.0 Vectors scores


Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17924

Sources (Detail)

BID http://www.securityfocus.com/bid/106132
MISC https://ics-cert.us-cert.gov/advisories/ICSA-18-310-02

Alert History

If you want to see full details history, please login or register.
2018-12-08 17:19:05
  • Multiple Updates
2018-12-07 17:19:14
  • First insertion