Vulnerability Details CVE-2012-6436
The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the CPU to crash. Successful exploitation of this vulnerability could cause loss of availability and a disruption in communications with other connected devices.
Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400
Exploit prediction scoring system (EPSS) score
EPSS Score 0.191
EPSS Ranking 95.0%
CVSS Severity
CVSS v2 Score 7.8
Products affected by CVE-2012-6436
-
cpe:2.3:a:rockwellautomation:controllogix_controllers:*
-
cpe:2.3:a:rockwellautomation:guardlogix_controllers:*
-
cpe:2.3:a:rockwellautomation:micrologix:*
-
cpe:2.3:a:rockwellautomation:softlogix_controllers:*
-
cpe:2.3:h:rockwellautomation:1756-enbt:-
-
cpe:2.3:h:rockwellautomation:1756-eweb:-
-
cpe:2.3:h:rockwellautomation:1768-enbt:-
-
cpe:2.3:h:rockwellautomation:1768-eweb:-
-
cpe:2.3:h:rockwellautomation:1794-aentr_flex_i/o_ethernet/ip_adapter:-
-
cpe:2.3:h:rockwellautomation:compactlogix:*
-
cpe:2.3:h:rockwellautomation:compactlogix_controllers:*
-
cpe:2.3:h:rockwellautomation:compactlogix_l32e_controller:-
-
cpe:2.3:h:rockwellautomation:compactlogix_l35e_controller:-
-
cpe:2.3:h:rockwellautomation:controllogix:*
-
cpe:2.3:h:rockwellautomation:flexlogix_1788-enbt_adapter:-
-
cpe:2.3:h:rockwellautomation:guardlogix:*
-
cpe:2.3:h:rockwellautomation:softlogix:*