First published: Wed Aug 24 2016(Updated: )
Rockwell Automation MicroLogix 1400 PLC 1766-L32BWA, 1766-L32AWA, 1766-L32BXB, 1766-L32BWAA, 1766-L32AWAA, and 1766-L32BXBA devices have a hardcoded SNMP community, which makes it easier for remote attackers to load arbitrary firmware updates by leveraging knowledge of this community.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation 1766-L32AWA | ||
Rockwell Automation 1766-L32AWAA | ||
Rockwell Automation 1766-L32BWA | ||
Rockwell Automation 1766-L32BWAA | ||
rockwellautomation 1766-L32BXB firmware | ||
Rockwell Automation 1766-L32BXBA Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5645 has been rated as a high severity vulnerability due to the potential for remote attackers to load arbitrary firmware updates.
To mitigate CVE-2016-5645, users should disable SNMP or change the default SNMP community strings to prevent unauthorized access.
CVE-2016-5645 affects various Rockwell Automation MicroLogix 1400 PLC devices including models 1766-L32BWA, 1766-L32AWA, and others.
Exploitation of CVE-2016-5645 allows attackers to load arbitrary firmware onto affected devices, potentially compromising their operation and security.
As of now, Rockwell Automation has not publicly released a patch specifically addressing CVE-2016-5645, so implementing security practices is crucial.