CVE-2012-6442

CVSS V2 High 7.8 CVSS V3 None
Description
Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that specifies a reset.
Overview
  • CVE ID
  • CVE-2012-6442
  • Assigner
  • ics-cert@hq.dhs.gov
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2013-01-24T21:55:01
  • Last Modified Date
  • 2019-09-03T15:16:01
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:rockwellautomation:ethernet\/ip_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:rockwellautomation:1756-enbt:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:rockwellautomation:1756-eweb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:rockwellautomation:1768-enbt:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:rockwellautomation:1768-eweb:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:rockwellautomation:compactlogix_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:rockwellautomation:l32e:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:rockwellautomation:l35e:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:rockwellautomation:flexlogix_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:rockwellautomation:1788-enbt:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:rockwellautomation:flex_i\/o_ethernet\/ip__firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:rockwellautomation:1794-aentr:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:rockwellautomation:micrologix_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:rockwellautomation:1100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:rockwellautomation:1400:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:rockwellautomation:compactlogix_controllers_firmware:19:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:rockwellautomation:compactlogix_firmware:18:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:rockwellautomation:controllogix_controllers_firmware:20:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:rockwellautomation:controllogix_firmware:18:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:rockwellautomation:guardlogix_controllers_firmware:20:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:rockwellautomation:guardlogix_firmware:18:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:rockwellautomation:softlogix_controllers_firmware:19:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:rockwellautomation:softlogix_firmware:18:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.8
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.9
References
Reference URL Reference Tags
http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf Broken Link Third Party Advisory US Government Resource
https://tools.cisco.com/security/center/viewAlert.x?alertId=27862 Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 07:47:05 Added to TrackCVE