Remote Access Vulnerability in Rockwell Automation MicroLogix 1400 and ControlLogix Modules
CVE-2018-17924
Key Information:
- Vendor
Rockwellautomation
- Status
- Vendor
- CVE Published:
- 7 December 2018
Badges
What is CVE-2018-17924?
An unauthenticated remote attacker may exploit a vulnerability in Rockwell Automation's MicroLogix 1400 Controllers and ControlLogix Communications Modules. By sending a CIP connection request, the attacker can modify the IP configuration of the device, even if it is in Hard RUN mode. This manipulation can result in the loss of communication between the device and the rest of the system, as ongoing system traffic continues to target the original, overwritten IP address, potentially causing significant operational disruptions.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Rockwell Automation MicroLogix 1400 Controllers Series A, all versions, Series B, v21.003 and earlier,Series C, v21.003 and earlier, 1756 ControlLogix EtherNet/IP Communications Modules 1756-ENBT, all versions, 1756-EWEB Series A, all versions Series B, all versions, 1756-EN2F Series A, all versions, Series B, all versions, Series C, v10.10 and earlier, 1756-EN2T, Series A, all versions, Series B, all versions, Series C, all versions, Series D, v10.10 and earlier, 1756-EN2TR, Series A, all versions, Series B, all versions, Series C, v10.10 and earlier, 1756-EN3TR, Series A, all versions, Series B, v10.10 and earlier.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
