Lucene search

K
cveTalosCVE-2020-6111
HistoryDec 03, 2020 - 1:15 p.m.

CVE-2020-6111

2020-12-0313:15:10
CWE-189
talos
web.nvd.nist.gov
53
cve-2020-6111
denial of service
allen-bradley
micrologix 1100
plc
ipv4
vulnerability
nvd

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

36.9%

An exploitable denial-of-service vulnerability exists in the IPv4 functionality of Allen-Bradley MicroLogix 1100 Programmable Logic Controller Systems Series B FRN 16.000, Series B FRN 15.002, Series B FRN 15.000, Series B FRN 14.000, Series B FRN 13.000, Series B FRN 12.000, Series B FRN 11.000 and Series B FRN 10.000. A specially crafted packet can cause a major error, resulting in a denial of service. An attacker can send a malicious packet to trigger this vulnerability.

Affected configurations

Nvd
Vulners
Node
rockwellautomationmicrologix_1100_b_firmwareMatch10.000
OR
rockwellautomationmicrologix_1100_b_firmwareMatch11.000
OR
rockwellautomationmicrologix_1100_b_firmwareMatch12.000
OR
rockwellautomationmicrologix_1100_b_firmwareMatch13.000
OR
rockwellautomationmicrologix_1100_b_firmwareMatch14.000
OR
rockwellautomationmicrologix_1100_b_firmwareMatch15.000
OR
rockwellautomationmicrologix_1100_b_firmwareMatch15.002
OR
rockwellautomationmicrologix_1100_b_firmwareMatch16.000
AND
rockwellautomationmicrologix_1100Match-
VendorProductVersionCPE
rockwellautomationmicrologix_1100_b_firmware10.000cpe:2.3:o:rockwellautomation:micrologix_1100_b_firmware:10.000:*:*:*:*:*:*:*
rockwellautomationmicrologix_1100_b_firmware11.000cpe:2.3:o:rockwellautomation:micrologix_1100_b_firmware:11.000:*:*:*:*:*:*:*
rockwellautomationmicrologix_1100_b_firmware12.000cpe:2.3:o:rockwellautomation:micrologix_1100_b_firmware:12.000:*:*:*:*:*:*:*
rockwellautomationmicrologix_1100_b_firmware13.000cpe:2.3:o:rockwellautomation:micrologix_1100_b_firmware:13.000:*:*:*:*:*:*:*
rockwellautomationmicrologix_1100_b_firmware14.000cpe:2.3:o:rockwellautomation:micrologix_1100_b_firmware:14.000:*:*:*:*:*:*:*
rockwellautomationmicrologix_1100_b_firmware15.000cpe:2.3:o:rockwellautomation:micrologix_1100_b_firmware:15.000:*:*:*:*:*:*:*
rockwellautomationmicrologix_1100_b_firmware15.002cpe:2.3:o:rockwellautomation:micrologix_1100_b_firmware:15.002:*:*:*:*:*:*:*
rockwellautomationmicrologix_1100_b_firmware16.000cpe:2.3:o:rockwellautomation:micrologix_1100_b_firmware:16.000:*:*:*:*:*:*:*
rockwellautomationmicrologix_1100-cpe:2.3:h:rockwellautomation:micrologix_1100:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Allen-Bradley",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Allen-Bradley MicroLogix 1100 Programmable Logic Controller Systems Series B FRN 10.000, Allen-Bradley MicroLogix 1100 Programmable Logic Controller Systems Series B FRN 11.000, Allen-Bradley MicroLogix 1100 Programmable Logic Controller Systems Series B FRN 12.000, Allen-Bradley MicroLogix 1100 Programmable Logic Controller Systems Series B FRN 13.000, Allen-Bradley MicroLogix 1100 Programmable Logic Controller Systems Series B FRN 14.000, Allen-Bradley MicroLogix 1100 Programmable Logic Controller Systems Series B FRN 15.000, Allen-Bradley MicroLogix 1100 Programmable Logic Controller Systems Series B FRN 15.002, Allen-Bradley MicroLogix 1100 Programmable Logic Controller Systems Series B FRN 16.000"
      }
    ]
  }
]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

36.9%

Related for CVE-2020-6111