CWE
400
Advisory Published
Updated

CVE-2017-12093

First published: Thu Apr 05 2018(Updated: )

An exploitable insufficient resource pool vulnerability exists in the session communication functionality of Allen Bradley Micrologix 1400 Series B Firmware 21.2 and before. A specially crafted stream of packets can cause a flood of the session resource pool resulting in legitimate connections to the PLC being disconnected. An attacker can send unauthenticated packets to trigger this vulnerability.

Credit: talos-cna@cisco.com

Affected SoftwareAffected VersionHow to fix
Rockwellautomation Micrologix 1400 B Firmware<=21.2
Rockwellautomation Micrologix 1400

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2017-12093?

    CVE-2017-12093 is an exploitable insufficient resource pool vulnerability in the session communication functionality of Allen Bradley Micrologix 1400 Series B Firmware 21.2 and before.

  • How does CVE-2017-12093 affect Rockwell Automation Micrologix 1400 B Firmware?

    CVE-2017-12093 affects Rockwell Automation Micrologix 1400 B Firmware version 21.2 and before.

  • What is the severity of CVE-2017-12093?

    CVE-2017-12093 has a severity score of 5.3, which is classified as medium.

  • How can CVE-2017-12093 be exploited?

    CVE-2017-12093 can be exploited by sending a specially crafted stream of packets that can cause a flood of the session resource pool, resulting in legitimate connections being affected.

  • Is Rockwell Automation Micrologix 1400 vulnerable to CVE-2017-12093?

    Rockwell Automation Micrologix 1400 is vulnerable to CVE-2017-12093 if it is running firmware version 21.2 or earlier.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203