CVE-2021-32926 Vulnerability Details

  /     /     /  

CVE-2021-32926 Metadata Quick Info

CVE Published: 03/06/2021 | CVE Updated: 03/08/2024 | CVE Year: 2021
Source: icscert | Vendor: n/a | Product: Micro800, MicroLogix 1400
Status : PUBLISHED

CVE-2021-32926 Description

When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller (Micro800: All versions, MicroLogix 1400: Version 21 and later) causing a denial-of-service condition

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-300
CWE Name: CHANNEL ACCESSIBLE BY NON-ENDPOINT CWE-300
Source: n/a

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).