Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, If Simple Mail Transfer Protocol (SMTP) account data is saved in RSLogix 500, a local attacker with access to a victim’s project may be able to gather SMTP server authentication data as it is written to the project file in cleartext.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.us-cert.gov/ics/advisories/icsa-20-070-06 | Third Party Advisory US Government Resource | 
| https://www.us-cert.gov/ics/advisories/icsa-20-070-06 | Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
Configuration 2 (hide)
| AND | 
            
            
 
  | 
    
Configuration 3 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 05:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.us-cert.gov/ics/advisories/icsa-20-070-06 - Third Party Advisory, US Government Resource | 
Information
                Published : 2020-03-16 16:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-6980
Mitre link : CVE-2020-6980
CVE.ORG link : CVE-2020-6980
JSON object : View
Products Affected
                rockwellautomation
- micrologix_1100
 - micrologix_1100_firmware
 - micrologix_1400
 - micrologix_1400_b_firmware
 - micrologix_1400_a_firmware
 - rslogix_500
 
CWE
                
                    
                        
                        CWE-312
                        
            Cleartext Storage of Sensitive Information
