Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic function utilized to protect the password in MicroLogix is discoverable.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.us-cert.gov/ics/advisories/icsa-20-070-06 | Third Party Advisory US Government Resource | 
| https://www.us-cert.gov/ics/advisories/icsa-20-070-06 | Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
Configuration 2 (hide)
| AND | 
            
            
 
  | 
    
Configuration 3 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 05:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.us-cert.gov/ics/advisories/icsa-20-070-06 - Third Party Advisory, US Government Resource | 
Information
                Published : 2020-03-16 16:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-6984
Mitre link : CVE-2020-6984
CVE.ORG link : CVE-2020-6984
JSON object : View
Products Affected
                rockwellautomation
- micrologix_1100
 - micrologix_1100_firmware
 - micrologix_1400
 - micrologix_1400_b_firmware
 - micrologix_1400_a_firmware
 - rslogix_500
 
CWE
                
                    
                        
                        CWE-327
                        
            Use of a Broken or Risky Cryptographic Algorithm
