{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T17:17:58.572","vulnerabilities":[{"cve":{"id":"CVE-2022-3166","sourceIdentifier":"PSIRT@rockwellautomation.com","published":"2022-12-16T20:15:08.760","lastModified":"2024-11-21T07:18:57.717","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"\nRockwell Automation was made aware that the webservers of the Micrologix 1100 and 1400 controllers contain a vulnerability that may lead to a denial-of-service condition. The security vulnerability could be exploited by an attacker with network access to the affected systems by sending TCP packets to webserver and closing it abruptly which would cause a denial-of-service condition for the web server application on the device\n\n"},{"lang":"es","value":"Se informó a Rockwell Automation que los servidores web de los controladores Micrologix 1100 y 1400 contienen una vulnerabilidad que puede provocar una condición de Denegación de Servicio (DoS). La vulnerabilidad de seguridad podría ser explotada por un atacante con acceso a la red de los sistemas afectados enviando paquetes TCP al servidor web y cerrándolo abruptamente, lo que causaría una condición de Denegación de Servicio (DoS) para la aplicación del servidor web en el dispositivo."}],"metrics":{"cvssMetricV31":[{"source":"PSIRT@rockwellautomation.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"PSIRT@rockwellautomation.com","type":"Secondary","description":[{"lang":"en","value":"CWE-924"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-924"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:micrologix_1100_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"DCE86CDF-12CC-4B02-942D-BF9134218F2B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:micrologix_1100:-:*:*:*:*:*:*:*","matchCriteriaId":"DA42C7F4-EEC1-44D2-BD46-237969FF6E1A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:rockwellautomation:micrologix_1400_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"11507EFF-5C53-4217-9257-21936118C032"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*","matchCriteriaId":"196EA0BE-FDF3-46BE-B3DA-5F49208C5D80"}]}]}],"references":[{"url":"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137678","source":"PSIRT@rockwellautomation.com","tags":["Permissions Required","Vendor Advisory"]},{"url":"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137678","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Vendor Advisory"]}]}}]}