Vulnerability Details : CVE-2012-6442
Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to cause a denial of service (control and communication outage) via a CIP message that specifies a reset.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2012-6442
- cpe:2.3:o:rockwellautomation:ethernet\/ip_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:compactlogix_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:compactlogix_firmware:18:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:flexlogix_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:flex_i\/o_ethernet\/ip__firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:micrologix_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:compactlogix_controllers_firmware:19:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:controllogix_controllers_firmware:20:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:controllogix_firmware:18:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:guardlogix_controllers_firmware:20:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:guardlogix_firmware:18:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:softlogix_controllers_firmware:19:*:*:*:*:*:*:*
- cpe:2.3:o:rockwellautomation:softlogix_firmware:18:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-6442
92.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-6442
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2012-6442
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-6442
-
https://tools.cisco.com/security/center/viewAlert.x?alertId=27862
Announcement Regarding Non-Cisco Product Security AlertsThird Party Advisory
-
http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf
404 - File Not Found | CISABroken Link;Third Party Advisory;US Government Resource
Jump to