Vulnerability Details CVE-2012-6440
The web-server password-authentication functionality in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows man-in-the-middle attackers to conduct replay attacks via HTTP traffic.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 71.7%
CVSS Severity
CVSS v2 Score 9.3
Products affected by CVE-2012-6440
-
cpe:2.3:a:rockwellautomation:controllogix_controllers:*
-
cpe:2.3:a:rockwellautomation:guardlogix_controllers:*
-
cpe:2.3:a:rockwellautomation:micrologix:*
-
cpe:2.3:a:rockwellautomation:softlogix_controllers:*
-
cpe:2.3:h:rockwellautomation:1756-enbt:-
-
cpe:2.3:h:rockwellautomation:1756-eweb:-
-
cpe:2.3:h:rockwellautomation:1768-enbt:-
-
cpe:2.3:h:rockwellautomation:1768-eweb:-
-
cpe:2.3:h:rockwellautomation:1794-aentr_flex_i/o_ethernet/ip_adapter:-
-
cpe:2.3:h:rockwellautomation:compactlogix:*
-
cpe:2.3:h:rockwellautomation:compactlogix_controllers:*
-
cpe:2.3:h:rockwellautomation:compactlogix_l32e_controller:-
-
cpe:2.3:h:rockwellautomation:compactlogix_l35e_controller:-
-
cpe:2.3:h:rockwellautomation:controllogix:*
-
cpe:2.3:h:rockwellautomation:flexlogix_1788-enbt_adapter:-
-
cpe:2.3:h:rockwellautomation:guardlogix:*
-
cpe:2.3:h:rockwellautomation:softlogix:*