7.8
CWE
119
Advisory Published
Updated

CVE-2012-6442: Buffer Overflow

First published: Thu Jan 24 2013(Updated: )

Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that specifies a reset.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
Rockwell Automation Ethernet/IP Firmware
Rockwell Automation 1756-ENBT
Rockwell Automation 1756-EWEB
Rockwell Automation 1768-ENBT
Rockwell Automation 1768-EWEB
Rockwell Automation CompactLogix Firmware
Rockwell Automation L32E
rockwellautomation L35E
FLEXLogix firmware
Rockwell Automation 1788-ENBT
Rockwell Automation FLEX I/O Ethernet/IP Firmware
Rockwell Automation 1794-AENTR
Rockwell Automation MicroLogix Firmware
Rockwell Automation MicroLogix 1100
Rockwell Automation 1400
Rockwell Automation CompactLogix Controllers Firmware=19
Rockwell Automation CompactLogix Firmware=18
Rockwell Automation ControlLogix Controllers=20
Rockwell Automation ControlLogix Controllers Firmware=18
Rockwell Automation GuardLogix controllers firmware=20
Rockwell Automation GuardLogix Firmware=18
Rockwell Automation SoftLogix Controllers Firmware=19
Rockwell Automation SoftLogix Firmware=18

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2012-6442?

    CVE-2012-6442 has a severity rating of high due to its potential to allow unauthorized access and control of affected devices.

  • How do I fix CVE-2012-6442?

    To remediate CVE-2012-6442, update to the latest firmware version provided by Rockwell Automation for your affected devices.

  • Which products are affected by CVE-2012-6442?

    CVE-2012-6442 affects multiple Rockwell Automation EtherNet/IP products including 1756-ENBT, 1768-ENBT, and CompactLogix controllers among others.

  • Is CVE-2012-6442 remotely exploitable?

    Yes, CVE-2012-6442 can be exploited remotely, potentially allowing attackers to gain control of affected devices.

  • Are there any workarounds for CVE-2012-6442?

    While updating firmware is the primary fix for CVE-2012-6442, reducing network exposure of affected devices can serve as a temporary workaround.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203