---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: Rockwell Automation MicroLogix Controller Security Issue and Vulnerability SECUNIA ADVISORY ID: SA38246 VERIFY ADVISORY: http://secunia.com/advisories/38246/ DESCRIPTION: A security issue and a vulnerability have been reported in Rockwell Automation MicroLogix controllers, which can be exploited by malicious people to disclose sensitive information or bypass certain security restrictions. 1) An error in the communication protocol can be exploited to intercept and decipher the password and gain unauthorised access to the product. 2) An error in the authentication mechanism can be exploited to gain access to the product and potentially make unauthorised changes to the product settings. Successful exploitation requires access to the control system communication network. The security issue and the vulnerability are reported in MicroLogix 1000 (1761), MicroLogix 1100 (1763), MicroLogix 1200 (1762), MicroLogix 1400 (1766), and MicroLogix 1500 (1764). SOLUTION: The vendor recommends to restrict access to the control system communication network (please see the vendor's advisories for more information). Reportedly, the vendor is working on an update. PROVIDED AND/OR DISCOVERED BY: Eyal Udassin, C4 Security ORIGINAL ADVISORY: Rockwell Automation: http://rockwellautomation.custhelp.com/app/answers/detail/a_id/65980 http://rockwellautomation.custhelp.com/app/answers/detail/a_id/65982 C4 Security: http://www.scada-security.com/vulnerabilities/rockwellautomation1.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------