CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
EPSS
Percentile
59.9%
The firmware installed on the remote Allen-Bradley MicroLogix 1400 PLC device is a version prior to 15.003. It is, therefore, affected by multiple vulnerabilities :
A flaw exists due to improper sanitization of user-supplied input before using it in SQL queries. An authenticated, remote attacker can exploit this to inject SQL queries against the back-end database, resulting in the manipulation or disclosure of arbitrary data. (CVE-2015-6486)
A cross-site scripting (XSS) vulnerability exists due to improper validation of input before returning it to users. An unauthenticated, remote attacker can exploit this, via a crafted request, to execute arbitrary script code in the user’s browser session. (CVE-2015-6488)
A flaw exists due to improper sanitization of user-supplied input before returning it to users. An authenticated, remote attacker can exploit this to insert into a FRAME element the content of an include file from a remote host, resulting in the execution of arbitrary commands or code with the same privileges as the web server. (CVE-2015-6491)
A memory corruption issue exists that allows an unauthenticated, remote attacker, via a crafted HTTP request, to crash the device, resulting in a denial of service condition. (CVE-2015-6492)
Binary data scada_RA_76325_1400.nbin
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6486
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6488
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6491
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6492
www.nessus.org/u?e8ec3436
ics-cert.us-cert.gov/advisories/ICSA-15-300-03A
ics-cert.us-cert.gov/alerts/ICS-ALERT-15-225-02A