First published: Thu Jan 28 2016(Updated: )
Stack-based buffer overflow on Rockwell Automation Allen-Bradley MicroLogix 1100 devices A through 15.000 and B before 15.002 allows remote attackers to execute arbitrary code via a crafted web request.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation MicroLogix | =1100 | |
Rockwell Automation 1763-L16AWA Series A | =15.000 | |
Rockwell Automation 1763-L16AWA Series B | =15.000 | |
Rockwell Automation 1763-L16BBB Series A | =15.000 | |
Rockwell Automation 1763-L16BBB Series B | =15.000 | |
Rockwell Automation 1763-L16BWA Series A | =15.000 | |
Rockwell Automation 1763-L16AWA Series B | =15.000 | |
Rockwell Automation 1763-L16DWD Series A | =15.000 | |
Rockwell Automation 1763-L16DWD Series B | =15.000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0868 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2016-0868, update the affected Rockwell Automation Allen-Bradley MicroLogix 1100 devices to version 15.002 or later.
CVE-2016-0868 affects Rockwell Automation Allen-Bradley MicroLogix 1100 devices running version 15.000 or earlier.
Yes, CVE-2016-0868 can be exploited remotely via a crafted web request.
CVE-2016-0868 is a stack-based buffer overflow vulnerability.