Vulnerability Description
Rockwell Automation Allen-Bradley MicroLogix controller 1100, 1200, 1400, and 1500; SLC 500 controller platform; and PLC-5 controller platform, when Static status is not enabled, allow remote attackers to cause a denial of service via messages that trigger modification of status bits.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rockwellautomation | Ab Micrologix Controller | 1100 |
| Rockwellautomation | Plc-5 Controller | - |
| Rockwellautomation | Slc 500 Controller | - |
Related Weaknesses (CWE)
References
- http://ics-cert.us-cert.gov/advisories/ICSA-12-342-01A
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-342-01.pdfUS Government Resource
- https://rockwellautomation.custhelp.com/app/answers/detail/a_id/511407
- http://ics-cert.us-cert.gov/advisories/ICSA-12-342-01A
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-342-01.pdfUS Government Resource
- https://rockwellautomation.custhelp.com/app/answers/detail/a_id/511407
FAQ
What is CVE-2012-4690?
CVE-2012-4690 is a vulnerability with a CVSS score of 7.1 (HIGH). Rockwell Automation Allen-Bradley MicroLogix controller 1100, 1200, 1400, and 1500; SLC 500 controller platform; and PLC-5 controller platform, when Static status is not enabled, allow remote attacker...
How severe is CVE-2012-4690?
CVE-2012-4690 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-4690?
Check the references section above for vendor advisories and patch information. Affected products include: Rockwellautomation Ab Micrologix Controller, Rockwellautomation Plc-5 Controller, Rockwellautomation Slc 500 Controller.