#VU6695 Authentication bypass in Allen-Bradley MicroLogix 1400 and Allen-Bradley MicroLogix 1100 - CVE-2017-7898


Vulnerability identifier: #VU6695

Vulnerability risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2017-7898

CWE-ID: CWE-307

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Allen-Bradley MicroLogix 1400
Hardware solutions / Office equipment, IP-phones, print servers
Allen-Bradley MicroLogix 1100
Hardware solutions / Office equipment, IP-phones, print servers

Vendor: Rockwell Automation

Description
The vulnerability allows a remote attacker to perform brute-force attack.

The vulnerability exists due to improper restriction of excessive authentication attempts. A remote attacker can repeatedly enter incorrect passwords to gain unauthorized access to the system.

Successful exploitation of the vulnerability may result in unauthorized access to vulnerable system.

Mitigation
Update to version 21.00

Vulnerable software versions

Allen-Bradley MicroLogix 1400: 1766-L32AWAA 16.00 - 1766-L32AWA 16.00

Allen-Bradley MicroLogix 1100: 1763-L16DWD 16.00 - 1763-L16AWA 16.00


External links
https://ics-cert.us-cert.gov/advisories/ICSA-17-115-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability