CVE-2021-32926

When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller (Micro800: All versions, MicroLogix 1400: Version 21 and later) causing a denial-of-service condition
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-145-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:rockwellautomation:micro800_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:micro800:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:rockwellautomation:micrologix_1400_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*

History

25 Oct 2022, 19:34

Type Values Removed Values Added
CWE CWE-300 NVD-CWE-Other

15 Jun 2021, 16:10

Type Values Removed Values Added
References (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-145-02 - (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-145-02 - Third Party Advisory, US Government Resource
CPE cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:micro800:-:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:micrologix_1400_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rockwellautomation:micro800_firmware:*:*:*:*:*:*:*:*
CWE CWE-300
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5

03 Jun 2021, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-03 13:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-32926

Mitre link : CVE-2021-32926

CVE.ORG link : CVE-2021-32926


JSON object : View

Products Affected

rockwellautomation

  • micrologix_1400_firmware
  • micro800
  • micrologix_1400
  • micro800_firmware
CWE
NVD-CWE-Other CWE-300

Channel Accessible by Non-Endpoint