Lucene search

K
nvd[email protected]NVD:CVE-2017-7903
HistoryJun 30, 2017 - 3:29 a.m.

CVE-2017-7903

2017-06-3003:29:00
CWE-326
CWE-521
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.2%

A Weak Password Requirements issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected products use a numeric password with a small maximum character size for the password.

Affected configurations

NVD
Node
rockwellautomation1763-l16awa_series_aRange16.000
OR
rockwellautomation1763-l16awa_series_bRange16.000
OR
rockwellautomation1763-l16bbb_series_aRange16.000
OR
rockwellautomation1763-l16bbb_series_bRange16.000
OR
rockwellautomation1763-l16bwa_series_aRange16.000
OR
rockwellautomation1763-l16bwa_series_bRange16.000
OR
rockwellautomation1763-l16dwd_series_aRange16.000
OR
rockwellautomation1763-l16dwd_series_bRange16.000
AND
rockwellautomationab_micrologix_controllerMatch1100
Node
rockwellautomation1766-l32awa_series_aRange16.000
OR
rockwellautomation1766-l32awa_series_bRange16.000
OR
rockwellautomation1766-l32awaa_series_aRange16.000
OR
rockwellautomation1766-l32awaa_series_bRange16.000
OR
rockwellautomation1766-l32bwa_series_aRange16.000
OR
rockwellautomation1766-l32bwa_series_bRange16.000
OR
rockwellautomation1766-l32bwaa_series_aRange16.000
OR
rockwellautomation1766-l32bwaa_series_bRange16.000
OR
rockwellautomation1766-l32bxb_series_aRange16.000
OR
rockwellautomation1766-l32bxb_series_bRange16.000
OR
rockwellautomation1766-l32bxba_series_aRange16.000
OR
rockwellautomation1766-l32bxba_series_bRange16.000
AND
rockwellautomationab_micrologix_controllerMatch1400

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.2%

Related for NVD:CVE-2017-7903