Lucene search

K
prionPRIOn knowledge basePRION:CVE-2021-32926
HistoryJun 03, 2021 - 1:15 p.m.

Race condition

2021-06-0313:15:00
PRIOn knowledge base
www.prio-n.com
1

7.4 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.4%

When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller (Micro800: All versions, MicroLogix 1400: Version 21 and later) causing a denial-of-service condition

CPENameOperatorVersion
micrologix_1400_firmwarege21.0

7.4 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.4%

Related for PRION:CVE-2021-32926