{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"1768-ENBT","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"MicroLogix 1400","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"1768-EWEB","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"1788-ENBT","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"1756-EWEB","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"1794-AENTR","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"CompactLogix L32 et L35E","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"1756-ENBT","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"ControlLogix, CompactLogix, GuardLogix, SoftLogix, version 18 et ant\u00e9rieures","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"MicroLogix 1100","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"EtherNet/IP","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-6441","url":"https://www.cve.org/CVERecord?id=CVE-2012-6441"},{"name":"CVE-2012-6437","url":"https://www.cve.org/CVERecord?id=CVE-2012-6437"},{"name":"CVE-2012-6442","url":"https://www.cve.org/CVERecord?id=CVE-2012-6442"},{"name":"CVE-2012-6435","url":"https://www.cve.org/CVERecord?id=CVE-2012-6435"},{"name":"CVE-2012-6438","url":"https://www.cve.org/CVERecord?id=CVE-2012-6438"},{"name":"CVE-2012-6436","url":"https://www.cve.org/CVERecord?id=CVE-2012-6436"},{"name":"CVE-2012-6439","url":"https://www.cve.org/CVERecord?id=CVE-2012-6439"},{"name":"CVE-2012-6440","url":"https://www.cve.org/CVERecord?id=CVE-2012-6440"}],"links":[],"reference":"CERTA-2013-AVI-047","revisions":[{"description":"version initiale.","revision_date":"2013-01-17T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Rockwell Automation Controllogix</span>. Elles concernent\ndes d\u00e9nis de services \u00e0 distance et des atteintes \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans le syst\u00e8me SCADA Rockwell Automation Controllogix","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 ICSA-13-011-03 du 11 janvier 2013","url":"http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-03.pdf"}]}
