Rockwellautomation

Micrologix 1100 Firmware

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 16.12.2022 21:15:09
  • Zuletzt bearbeitet 21.11.2024 07:30:52

Rockwell Automation was made aware of a vulnerability by a security researcher from Georgia Institute of Technology that the MicroLogix 1100 and 1400 controllers contain a vulnerability that may give an attacker the ability to accomplish remote code...

  • EPSS 0.21%
  • Veröffentlicht 16.12.2022 20:15:08
  • Zuletzt bearbeitet 21.11.2024 07:18:57

Rockwell Automation was made aware that the webservers of the Micrologix 1100 and 1400 controllers contain a vulnerability that may lead to a denial-of-service condition. The security vulnerability could be exploited by an attacker with network acce...

  • EPSS 0.82%
  • Veröffentlicht 20.07.2022 16:15:09
  • Zuletzt bearbeitet 21.11.2024 07:00:29

The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks.

  • EPSS 2.74%
  • Veröffentlicht 09.07.2021 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:08:07

Rockwell Automation MicroLogix 1100, all versions, allows a remote, unauthenticated attacker sending specially crafted commands to cause the PLC to fault when the controller is switched to RUN mode, which results in a denial-of-service condition. If ...

  • EPSS 0.01%
  • Veröffentlicht 16.03.2020 16:15:14
  • Zuletzt bearbeitet 21.11.2024 05:36:25

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, If Simple Mail Transfer Protocol (SMTP) account data is saved in RSL...

  • EPSS 0.2%
  • Veröffentlicht 16.03.2020 16:15:14
  • Zuletzt bearbeitet 21.11.2024 05:36:26

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic function utilized to protect the password in Micro...

  • EPSS 0.13%
  • Veröffentlicht 16.03.2020 16:15:14
  • Zuletzt bearbeitet 21.11.2024 05:36:26

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLog...

  • EPSS 0.11%
  • Veröffentlicht 16.03.2020 16:15:14
  • Zuletzt bearbeitet 21.11.2024 05:36:26

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic key utilized to help protect the account password ...

  • EPSS 2.99%
  • Veröffentlicht 25.04.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:13

In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earlier, MicroLogix 1100 Controllers v14.00 and earlier, CompactLogix 5370 L1 controllers v30.014 and earlier, CompactLogix 5370 L2 controllers v30.014 an...

  • EPSS 9.57%
  • Veröffentlicht 28.10.2015 10:59:14
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Allen-Bradley MicroLogix 1100 devices before B FRN 15.000 and 1400 devices before B FRN 15.003 allow remote attackers to cause a denial of service (memory corruption and device crash) via a crafted HTTP request.