PT-2017-01: Information Disclosure in Rockwell Automation Micrologix 1100 and 1400 PLC

Vulnerable product

Micrologix 1100
Version: 1763-L16AWA, 1763-L16BBB, 763-L16BWA, 1763-L16DWD series A and B before 15.000

Micrologix 1400
Version: 1766-L32AWA, 1766-L32BWA, 1766-L32BWAA, 1766-L32BXB, 1766-L32BXBA, 1766-L32AWAA series A and B before 16.000

Links:
http://www.rockwellautomation.com/

Severity level

Severity level: Medium
Impact: Information Disclosure
Access Vector: Remote

CVSS v3:
Base Score: 6.5
Vector: (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVE: CVE-2016-9334

Software description

Rockwell Automation Micrologix 1100 and 1400 are programmable logic controllers.

Vulnerability description

The specialists of the Positive Research center have detected an Information Disclosure vulnerability in Rockwell Automation Micrologix 1100 and 1400 PLC.

Vulnerability in Allen-Bradly MicroLogix 1100 and 1400 allows remote attackers to obtain user credentials in clear text by sniffing browser-to-server traffic.

How to fix

Update the firmware of your device to the latest version

Advisory status

11.06.2015 - Vendor gets vulnerability details
05.01.2017 - Vendor releases fixed version and details
11.01.2017 - Public disclosure

Credits

The vulnerability was detected by Alexey Osipov, Ilya Karpov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2017-01
https://ics-cert.us-cert.gov/advisories/ICSA-16-336-06

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/ww-en/analytics/threatscape/
http://en.securitylab.ru/lab/

Threatscape
4G and 5G are not ready for smart cities