8.5
Advisory Published
Updated

CVE-2012-6439

First published: Thu Jan 24 2013(Updated: )

Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that modifies the (1) configuration or (2) network parameters.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
Rockwell Automation ControlLogix Controllers<=20
Rockwell Automation GuardLogix controllers firmware<=20
Rockwell Automation MicroLogix Firmware<=1100
Rockwell Automation MicroLogix Firmware<=1400
Rockwell Automation SoftLogix Controllers Firmware<=19
Rockwell Automation 1756-ENBT
Rockwell Automation 1756-EWEB
Rockwell Automation 1768-ENBT
Rockwell Automation 1768-EWEB
Rockwell Automation 1794-AENTR FLEX I/O Ethernet/IP Adapter
Rockwell Automation CompactLogix<=18
Rockwell Automation CompactLogix Controllers Firmware<=19
CompactLogix L32E Controller
Rockwell Automation CompactLogix L35E Controller
Rockwell Automation ControlLogix Controllers<=18
Rockwell Automation FLEXLogix 1788-ENBT
Rockwell Automation GuardLogix Controllers<=18
Rockwell Automation SoftLogix<=18

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2012-6439?

    CVE-2012-6439 is classified as a medium severity vulnerability.

  • How do I fix CVE-2012-6439?

    To fix CVE-2012-6439, update the affected Rockwell Automation EtherNet/IP products and ensure the latest firmware patches are applied.

  • What products are affected by CVE-2012-6439?

    CVE-2012-6439 affects various Rockwell Automation EtherNet/IP products including ControlLogix, GuardLogix, and CompactLogix controllers.

  • Is CVE-2012-6439 exploitable remotely?

    Yes, CVE-2012-6439 can potentially be exploited remotely by an attacker.

  • What type of vulnerability is CVE-2012-6439?

    CVE-2012-6439 is a security vulnerability associated with improper input validation in Rockwell Automation products.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203