{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T01:08:16.433","vulnerabilities":[{"cve":{"id":"CVE-2017-16740","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2018-01-09T21:29:00.420","lastModified":"2024-11-21T03:16:52.917","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Buffer Overflow issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers, Series B and C Versions 21.002 and earlier. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution."},{"lang":"es","value":"Se ha descubierto un problema de desbordamiento de búfer en Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers, Series B y C, en versiones 21.002 y anteriores. Se ha identificado una vulnerabilidad de desbordamiento de búfer basado en pila, lo que podría permitir la ejecución remota de código."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:1766-l32bxba_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"21.002","matchCriteriaId":"7E9D1B7A-C310-4E73-884C-F0730294CF01"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:1766-l32bxba:-:*:*:*:*:*:*:*","matchCriteriaId":"F03C6CFA-F770-4BCA-BB74-BD0D43C250F7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:1766-l32awa_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"21.002","matchCriteriaId":"8FC1BA3D-024D-490D-AFC0-6C5B624AD759"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:1766-l32awa:-:*:*:*:*:*:*:*","matchCriteriaId":"5EC2A03F-A665-4874-896C-B603110BADA0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:1766-l32bxb_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"21.002","matchCriteriaId":"9B390FC5-BE0C-43B1-BCF3-07A3E98E910D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:1766-l32bxb:-:*:*:*:*:*:*:*","matchCriteriaId":"D3BFF3BE-77D5-4D28-831A-13136D8E0B6D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:1766-l32bwaa_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"21.002","matchCriteriaId":"25407193-4A83-40BD-988A-17A58864D57A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:1766-l32bwaa:-:*:*:*:*:*:*:*","matchCriteriaId":"3250570F-0A69-4484-BD7F-012AC8A2DC7F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:1766-l32awaa_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"21.002","matchCriteriaId":"F0C08079-98A4-409D-BBF4-6C47304B3955"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:1766-l32awaa:-:*:*:*:*:*:*:*","matchCriteriaId":"55E42B9C-4D13-48DE-A522-28B1FA1B943E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:1766-l32bwa_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"21.002","matchCriteriaId":"3D02BB40-75B6-4AD1-9FA4-1659028BBFE8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:1766-l32bwa:-:*:*:*:*:*:*:*","matchCriteriaId":"BF023FAE-BC4D-4DB7-830E-0A522C8E51CC"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/102474","source":"ics-cert@hq.dhs.gov","tags":["Mitigation","Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-009-01","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1070883","source":"ics-cert@hq.dhs.gov"},{"url":"http://www.securityfocus.com/bid/102474","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-009-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1070883","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}