First published: Fri Jun 30 2017(Updated: )
A "Reusing a Nonce, Key Pair in Encryption" issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected product reuses nonces, which may allow an attacker to capture and replay a valid request until the nonce is changed.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation 1763-L16AWA Series A | <=16.000 | |
Rockwell Automation 1763-L16AWA Series B | <=16.000 | |
Rockwell Automation 1763-L16BBB Series A | <=16.000 | |
Rockwell Automation 1763-L16BBB Series B | <=16.000 | |
Rockwell Automation 1763-L16BWA Series A | <=16.000 | |
Rockwell Automation 1763-L16AWA Series B | <=16.000 | |
Rockwell Automation 1763-L16DWD Series A | <=16.000 | |
Rockwell Automation 1763-L16DWD Series B | <=16.000 | |
Rockwell Automation MicroLogix | =1100 | |
Rockwell Automation 1766-L32AWA Series A | <=16.000 | |
Rockwell Automation 1766-L32AWA Series B | <=16.000 | |
Rockwell Automation 1766-L32AWAA Series A | <=16.000 | |
Rockwell Automation 1766-L32AWAA Series B | <=16.000 | |
Rockwell Automation 1766-L32BWA Series A | <=16.000 | |
Rockwell Automation 1766-L32BWA Series B | <=16.000 | |
Rockwell Automation 1766-L32BWAA Series A | <=16.000 | |
Rockwell Automation 1766-L32BWAA Series A | <=16.000 | |
Rockwell Automation 1766-L32BXB Series A | <=16.000 | |
Rockwell Automation 1766-L32BXB Series B | <=16.000 | |
Rockwell Automation 1766-L32BXBA Series A | <=16.000 | |
Rockwell Automation 1766-L32BXBA Series B | <=16.000 | |
Rockwell Automation MicroLogix | =1400 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7902 has a severity rating that indicates a critical risk, as it involves reusing a nonce in encryption affecting multiple Rockwell Automation controllers.
To mitigate CVE-2017-7902, users should update their Rockwell Automation Allen-Bradley MicroLogix 1100 controllers to the latest firmware version beyond 16.00.
CVE-2017-7902 affects Rockwell Automation Allen-Bradley MicroLogix 1100 controllers of various models including Series A and B, specifically versions up to 16.00.
CVE-2017-7902 is categorized as a cryptographic issue due to the improper reuse of nonces and key pairs in encryption.
There is no public indication that CVE-2017-7902 is actively being exploited, but it poses a serious security risk and should be addressed immediately.