PT-2015-17: SQL injection in Rockwell Automation Micrologix 1100 and 1400 PLC
Vulnerable product
Micrologix 1100
Version: Series B before FRN 15.000
Micrologix 1400
Version: Series B before FRN 15.003
Links:
http://www.rockwellautomation.com/
Severity level
Severity level: Medium
Impact: SQL injection
Access Vector: Remote
CVSS v2:
Base Score: 6.5
Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVE: CVE-2015-6486
Software description
Rockwell Automation Micrologix 1100 and 1400 are programmable logic controllers.
Vulnerability description
The specialists of the Positive Research center have detected an SQL injection vulnerability in Rockwell Automation Micrologix 1100 and 1400 PLC.
SQL injection vulnerability exists on Allen-Bradly MicroLogix 1100 and 1400 due to the improper sanitization of user input, which allows remote authenticated users to create new users, delete users, or escalate privileges via a specially crafted link.
How to fix
Update the firmware of your device to the latest version
Advisory status
11.06.2015 - Vendor gets vulnerability details
27.10.2015 - Vendor releases fixed version and details
03.12.2015 - Public disclosure
Credits
The vulnerability was detected by Ilya Karpov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2015-17
https://ics-cert.us-cert.gov/advisories/ICSA-15-300-03
Reports on the vulnerabilities previously discovered by Positive Research:
http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/