First published: Thu Jun 03 2021(Updated: )
When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller (Micro800: All versions, MicroLogix 1400: Version 21 and later) causing a denial-of-service condition
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Micro800 Firmware | ||
Rockwellautomation Micro800 | ||
Rockwellautomation Micrologix 1400 Firmware | >=21.0 | |
Rockwellautomation Micrologix 1400 | ||
Rockwell Automation Micro800 | ||
Rockwell Automation MicroLogix 1400: Version 21 and later when Enhanced Password Security enabled |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32926 is a vulnerability that allows an attacker to intercept and replace the legitimate password hash during an authenticated password change request.
CVE-2021-32926 has a severity rating of 7.5 (high).
The Rockwellautomation Micro800 Firmware and Rockwellautomation Micrologix 1400 Firmware are affected by CVE-2021-32926.
An attacker can exploit CVE-2021-32926 by intercepting the password change request and replacing the legitimate password hash with an illegitimate one.
Yes, Rockwellautomation Micro800 Firmware is vulnerable to CVE-2021-32926.