Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-12090 : What You Need to Know

Learn about CVE-2017-12090, a high-severity vulnerability in Allen Bradley Micrologix 1400 Series B FRN 21.2 and earlier versions. Find out how attackers can exploit SNMP-Set commands to cause denial of service.

A vulnerability in the processing of snmp-set commands in Allen Bradley Micrologix 1400 Series B FRN 21.2 and earlier versions can lead to a denial of service attack.

Understanding CVE-2017-12090

This CVE involves a specific vulnerability in Allen Bradley devices that can be exploited to cause a denial of service, impacting device availability.

What is CVE-2017-12090?

CVE-2017-12090 is a vulnerability in the way snmp-set commands are handled in Allen Bradley Micrologix 1400 Series B FRN 21.2 and earlier versions. Attackers can exploit this flaw to trigger a denial of service by sending a specially crafted snmp-set request, resulting in device downtime.

The Impact of CVE-2017-12090

The vulnerability has a CVSS base score of 7.7, indicating a high severity level. It can lead to a complete denial of service, causing the device to power cycle with just one malicious packet.

Technical Details of CVE-2017-12090

This section provides more in-depth technical insights into the vulnerability.

Vulnerability Description

The vulnerability lies in the processing of snmp-set commands in Allen Bradley Micrologix 1400 Series B FRN 21.2 and earlier versions. By sending a specific snmp-set request, attackers can induce a denial of service without the need for firmware flashing commands.

Affected Systems and Versions

        Product: Allen Bradley
        Vendor: Talos
        Affected Versions: Allen Bradley Micrologix 1400 Series B FRN 21.2, 21.0, 15

Exploitation Mechanism

        Attack Complexity: Low
        Attack Vector: Network
        Privileges Required: Low
        User Interaction: None
        Scope: Changed
        Impact: High availability impact

Mitigation and Prevention

Protecting systems from CVE-2017-12090 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Apply vendor patches or updates promptly.
        Implement network segmentation to limit exposure.
        Monitor network traffic for suspicious activities.

Long-Term Security Practices

        Regularly update and patch all devices and software.
        Conduct security assessments and penetration testing.
        Educate users and administrators on security best practices.

Patching and Updates

        Check for official patches from Allen Bradley and Talos.
        Keep systems up to date with the latest firmware releases.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now