CVE-2021-32926
Published Jun 3, 2021
Last updated 2 years ago
Overview
- Description
- When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller (Micro800: All versions, MicroLogix 1400: Version 21 and later) causing a denial-of-service condition
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
- ics-cert@hq.dhs.gov
- CWE-300
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:rockwellautomation:micro800_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03D4249D-322C-4015-B5B7-14C1E85C7295" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:rockwellautomation:micro800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "215D0B80-D0F4-41FD-9255-FBB15C5E282F" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:rockwellautomation:micrologix_1400_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBA94A94-6328-4309-9EB1-95C433EE53F5", "versionStartIncluding": "21.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "196EA0BE-FDF3-46BE-B3DA-5F49208C5D80" } ], "operator": "OR" } ], "operator": "AND" } ]