When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller (Micro800: All versions, MicroLogix 1400: Version 21 and later) causing a denial-of-service condition
                
            References
                    | Link | Resource | 
|---|---|
| https://us-cert.cisa.gov/ics/advisories/icsa-21-145-02 | Third Party Advisory US Government Resource | 
| https://us-cert.cisa.gov/ics/advisories/icsa-21-145-02 | Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
Configuration 2 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 06:07
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-145-02 - Third Party Advisory, US Government Resource | 
Information
                Published : 2021-06-03 13:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32926
Mitre link : CVE-2021-32926
CVE.ORG link : CVE-2021-32926
JSON object : View
Products Affected
                rockwellautomation
- micro800_firmware
 - micro800
 - micrologix_1400
 - micrologix_1400_firmware
 
CWE
                