4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.001 Low
EPSS
Percentile
45.4%
Micrologix 1100
Version: Series B before FRN 15.000
Micrologix 1400
Version: Series B before FRN 15.003
Links:
http://www.rockwellautomation.com/
Severity level: Medium
Impact: Cross-site scripting
Access Vector: Remote
CVSS v2:
Base Score: 4.3
Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVE: CVE-2015-6488
Rockwell Automation Micrologix 1100 and 1400 are programmable logic controllers.
The specialists of the Positive Research center have detected a Cross-site scripting vulnerability in Rockwell Automation Micrologix 1100 and 1400 PLC.
Cross-site scripting vulnerability in the web server on Allen-Bradly MicroLogix 1100 and 1400 devices allows remote attackers to inject arbitrary Javascript or HTML code, which could be executed in the browser in the context of the current user.
Update the firmware of your device to the latest version
11.06.2015 - Vendor gets vulnerability details
27.10.2015 - Vendor releases fixed version and details
03.12.2015 - Public disclosure
The vulnerability was detected by Ilya Karpov, Positive Research Center (Positive Technologies Company)
http://en.securitylab.ru/lab/PT-2015-16
https://ics-cert.us-cert.gov/advisories/ICSA-15-300-03
Reports on the vulnerabilities previously discovered by Positive Research:
<http://www.ptsecurity.com/research/advisory/>
<http://en.securitylab.ru/lab/>