CWE
287
Advisory Published
Updated

CVE-2012-6440

First published: Thu Jan 24 2013(Updated: )

The web-server password-authentication functionality in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows man-in-the-middle attackers to conduct replay attacks via HTTP traffic.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
Rockwell Automation ControlLogix Controllers<=20
Rockwell Automation GuardLogix controllers firmware<=20
Rockwell Automation MicroLogix Firmware<=1100
Rockwell Automation MicroLogix Firmware<=1400
Rockwell Automation SoftLogix Controllers Firmware<=19
Rockwell Automation 1756-ENBT
Rockwell Automation 1756-EWEB
Rockwell Automation 1768-ENBT
Rockwell Automation 1768-EWEB
Rockwell Automation 1794-AENTR FLEX I/O Ethernet/IP Adapter
Rockwell Automation CompactLogix<=18
Rockwell Automation CompactLogix Controllers Firmware<=19
CompactLogix L32E Controller
Rockwell Automation CompactLogix L35E Controller
Rockwell Automation ControlLogix Controllers<=18
Rockwell Automation FLEXLogix 1788-ENBT
Rockwell Automation GuardLogix Controllers<=18
Rockwell Automation SoftLogix<=18

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2012-6440?

    CVE-2012-6440 has a high severity rating due to its potential impact on unauthorized access to sensitive systems.

  • How do I fix CVE-2012-6440?

    To mitigate CVE-2012-6440, ensure that you apply the latest firmware updates provided by Rockwell Automation for affected products.

  • Which products are affected by CVE-2012-6440?

    CVE-2012-6440 affects several Rockwell Automation EtherNet/IP communication modules and controllers, including ControlLogix and CompactLogix models.

  • What kind of vulnerabilities does CVE-2012-6440 represent?

    CVE-2012-6440 represents a vulnerability in the password-authentication functionality of specific Rockwell Automation products.

  • Is my system vulnerable if I use Rockwell Automation products?

    If you are using the specified models and firmware versions listed in CVE-2012-6440, your system may be vulnerable.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203