Lucene search

K
nessusThis script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_ROCKWELL_CVE-2012-6439.NASL
HistoryFeb 07, 2022 - 12:00 a.m.

Rockwell Controllers Denial Of Service (CVE-2012-6439)

2022-02-0700:00:00
This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
18

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:P/A:C

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.5%

Rockwell Automation EtherNet/IP products allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that modifies the (1) configuration or (2) network parameters.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 70300
##
# (C) Tenable, Inc.
##

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(500254);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/12/14");

  script_cve_id("CVE-2012-6439");

  script_name(english:"Rockwell Controllers Denial Of Service (CVE-2012-6439)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"Rockwell Automation EtherNet/IP products allow remote attackers to
cause a denial of service (control and communication outage) via a
CIP message that modifies the (1) configuration or (2) network
parameters.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-03");
  # https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/470155
  script_set_attribute(attribute:"see_also", value:"https://www.nessus.org/u?af210ad9");
  # https://literature.rockwellautomation.com/idc/groups/literature/documents/um/enet-um006_-en-p.pdf#G5.1036646
  script_set_attribute(attribute:"see_also", value:"https://www.nessus.org/u?5c145e8f");
  script_set_attribute(attribute:"solution", value:
"As mentionned 
Refer to the vendor advisory for mitigations.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-6439");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/01/24");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/01/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2022/02/07");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:compactlogix_l32e_controller:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:compactlogix_l35e_controller:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1756-en2t:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1756-en2f:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1756-en2txt:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1756-en2tr:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1756-en2trxt:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1756-en3tr:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1756-en4tr:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1756-en4trxt:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1756-enbt:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1756-eweb:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1768-enbt:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1768-eweb:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:1794-aentr_flex_i%2fo_ethernet%2fip_adapter:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:5069-aentr:-");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:rockwellautomation:5069-aen2tr:-");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Rockwell");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Rockwell');

var asset = tenable_ot::assets::get(vendor:'Rockwell');

var vuln_cpes = {
    "cpe:/h:rockwellautomation:compactlogix_l32e_controller:-" :
        {"family" : "CompactLogix"},
    "cpe:/h:rockwellautomation:compactlogix_l35e_controller:-" :
        {"family" : "CompactLogix"},
    "cpe:/h:rockwellautomation:1756-en2t:-" :
        {"family" : "ControlLogix"},
    "cpe:/h:rockwellautomation:1756-en2f:-" :
        {"family" : "ControlLogix"},
    "cpe:/h:rockwellautomation:1756-en2txt:-" :
        {"family" : "ControlLogix"},
    "cpe:/h:rockwellautomation:1756-en2tr:-" :
        {"family" : "ControlLogix"},
    "cpe:/h:rockwellautomation:1756-en2trxt:-" :
        {"family" : "ControlLogix"},
    "cpe:/h:rockwellautomation:1756-en3tr:-" :
        {"family" : "ControlLogix"},
    "cpe:/h:rockwellautomation:1756-en4tr:-" :
        {"family" : "ControlLogix"},
    "cpe:/h:rockwellautomation:1756-en4trxt:-" :
        {"family" : "ControlLogix"},
    "cpe:/h:rockwellautomation:1756-enbt:-" :
        {"family" : "ControlLogix"},
    "cpe:/h:rockwellautomation:1756-eweb:-" :
        {"family" : "ControlLogix"},
    "cpe:/h:rockwellautomation:1768-enbt:-" :
        {"family" : "CompactLogix"},
    "cpe:/h:rockwellautomation:1768-eweb:-" :
        {"family" : "CompactLogix"},
    "cpe:/h:rockwellautomation:1794-aentr_flex_i%2fo_ethernet%2fip_adapter:-" :
        {"family" : "FlexLogix"},
    "cpe:/h:rockwellautomation:5069-aentr:-" :
        {"family" : "CompactLogix"},
    "cpe:/h:rockwellautomation:5069-aen2tr:-" :
        {"family" : "CompactLogix"},
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
VendorProductVersionCPE
rockwellautomationcompactlogix_l32e_controller-cpe:/h:rockwellautomation:compactlogix_l32e_controller:-
rockwellautomationcompactlogix_l35e_controller-cpe:/h:rockwellautomation:compactlogix_l35e_controller:-
rockwellautomation1756-en2t-cpe:/h:rockwellautomation:1756-en2t:-
rockwellautomation1756-en2f-cpe:/h:rockwellautomation:1756-en2f:-
rockwellautomation1756-en2txt-cpe:/h:rockwellautomation:1756-en2txt:-
rockwellautomation1756-en2tr-cpe:/h:rockwellautomation:1756-en2tr:-
rockwellautomation1756-en2trxt-cpe:/h:rockwellautomation:1756-en2trxt:-
rockwellautomation1756-en3tr-cpe:/h:rockwellautomation:1756-en3tr:-
rockwellautomation1756-en4tr-cpe:/h:rockwellautomation:1756-en4tr:-
rockwellautomation1756-en4trxt-cpe:/h:rockwellautomation:1756-en4trxt:-
Rows per page:
1-10 of 171

8.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:P/A:C

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.5%

Related for TENABLE_OT_ROCKWELL_CVE-2012-6439.NASL