The Rockwell Automation MicroLogix 1100 PLC integrated web server has a firmware version that is prior to Series B FRN 12.0. It is, therefore, affected by an authentication bypass vulnerability due to a failure to properly restrict session replays. A man-in-the-middle attacker via HTTP traffic can use a session replay attack to bypass the web serverβs authentication mechanism.
Note that Nessus has not attempted to exploit this issue but has instead relied only on the self-reported version number.
Binary data scada_rockwell_micrologix_1100_plc_mitm_470156.nbin
Vendor | Product | Version | CPE |
---|---|---|---|
rockwellautomation | micrologix | 1100 | cpe:/a:rockwellautomation:micrologix:1100 |