First published: Mon Mar 16 2020(Updated: )
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic key utilized to help protect the account password is hard coded into the RSLogix 500 binary file. An attacker could identify cryptographic keys and use it for further cryptographic attacks that could ultimately lead to a remote attacker gaining unauthorized access to the controller.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Micrologix 1400 A Firmware | ||
Rockwellautomation Micrologix 1400 B Firmware | <=21.001 | |
Rockwellautomation Micrologix 1400 | ||
Rockwellautomation Micrologix 1100 Firmware | ||
Rockwellautomation Micrologix 1100 | ||
Rockwellautomation Rslogix 500 | <=12.001 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-6990 is critical.
The affected software for CVE-2020-6990 includes Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, and RSLogix 500 Software v12.001 and prior.
CVE-2020-6990 allows an attacker to obtain the hard-coded cryptographic key used to protect account passwords in the RSLogix 500 binary file.
Yes, Rockwell Automation MicroLogix 1100 is affected by CVE-2020-6990.
To mitigate CVE-2020-6990, it is recommended to update to a version of Rockwell Automation MicroLogix 1400 Controllers Series B firmware that is newer than v21.001 and update RSLogix 500 Software to a version later than v12.001.