Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-17924

EPSS 0.09% · P25
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-17924

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键功能的认证机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Rockwell Automation产品安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Rockwell Automation MicroLogix 1400 Controllers Series A等都是美国罗克韦尔(Rockwell Automation)公司的可编程逻辑控制器。 多款Rockwell Automation产品中存在安全漏洞,该漏洞源于程序缺少身份验证。攻击者可通过发送CIP连接请求,完成连接后发送新的IP配置利用该漏洞修改系统配置并造成设备与系统之间的通信丢失。以下产品和版本受到影响:MicroLogix 1400 Controllers Series A(全部版本),
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Rockwell Automation MicroLogix 1400 Controllers Series A, all versions, Series B, v21.003 and earlier,Series C, v21.003 and earlier, 1756 ControlLogix EtherNet/IP Communications Modules 1756-ENBT, all versions, 1756-EWEB Series A, all versions Series B, all versions, 1756-EN -

II. Public POCs for CVE-2018-17924

#POC DescriptionSource LinkShenlong Link
1My team research about CVE-2018-17924 of Rockwell Automation Micrologix 1400https://github.com/g0dd0ghd/CVE-2018-17924POC Details
2My team research about CVE-2018-17924 of Rockwell Automation Micrologix 1400https://github.com/g0dd0ghd/CVE-2018-17924-PoCPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-17924

登录查看更多情报信息。

Same Patch Batch · n/a · 2018-12-07 · 29 CVEs total

CVE-2018-5812LibRaw 安全漏洞
CVE-2018-19932GNU Binutils 输入验证错误漏洞
CVE-2018-19931GNU Binutils 缓冲区错误漏洞
CVE-2018-19939Xiaomi Mi A2 Lite和RedMi6 pro Goodix GT9xx触屏驱动程序代码问题漏洞
CVE-2018-19935PHP 安全漏洞
CVE-2018-19001Philips HealthSuite Health Android App 安全漏洞
CVE-2018-19960OnionShare 安全漏洞
CVE-2018-15362GE Proficy CIMPLICITY 安全漏洞
CVE-2018-18314Perl 缓冲区错误漏洞
CVE-2018-18313Perl 缓冲区错误漏洞
CVE-2018-18311Perl 输入验证错误漏洞
CVE-2018-5816LibRaw 数字错误漏洞
CVE-2018-5815LibRaw 数字错误漏洞
CVE-2018-5813SUSE LibRaw 安全漏洞
CVE-2018-9572Android 缓冲区错误漏洞
CVE-2018-5811LibRaw 安全漏洞
CVE-2018-5810SUSE LibRaw 缓冲区错误漏洞
CVE-2018-5809LibRaw 缓冲区错误漏洞
CVE-2018-5808LibRaw 缓冲区错误漏洞
CVE-2018-5807LibRaw 安全漏洞

Showing top 20 of 29 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-17924

No comments yet


Leave a comment