PT-2015-16: Cross-site scripting in Rockwell Automation Micrologix 1100 and 1400 PLC Vulnerable productMicrologix 1100 Version: Series B before FRN 15.000Micrologix 1400 Version: Series B before FRN 15.003Links: http://www.rockwellautomation.com/Severity levelSeverity level: Medium Impact: Cross-site scripting Access Vector: Remote CVSS v2: Base Score: 4.3 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)CVE: CVE-2015-6488Software descriptionRockwell Automation Micrologix 1100 and 1400 are programmable logic controllers. Vulnerability descriptionThe specialists of the Positive Research center have detected a Cross-site scripting vulnerability in Rockwell Automation Micrologix 1100 and 1400 PLC.Cross-site scripting vulnerability in the web server on Allen-Bradly MicroLogix 1100 and 1400 devices allows remote attackers to inject arbitrary Javascript or HTML code, which could be executed in the browser in the context of the current user.How to fixUpdate the firmware of your device to the latest versionAdvisory status 11.06.2015 - Vendor gets vulnerability details 27.10.2015 - Vendor releases fixed version and details 03.12.2015 - Public disclosureCreditsThe vulnerability was detected by Ilya Karpov, Positive Research Center (Positive Technologies Company)References http://en.securitylab.ru/lab/PT-2015-16 https://ics-cert.us-cert.gov/advisories/ICSA-15-300-03 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/