An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
https://us.idec.com/idec-us/en/USD/Programmable-Logic-Controller/Micro-PLC/FC6A-MicroSmart/c/MicroSmart_FC6A | vendor advisory |
https://us.idec.com/idec-us/en/USD/Software-Downloads-Automation-Organizer | vendor advisory |
https://www.idec.com/home/lp/pdf/2021-12-24-PLC.pdf | vendor advisory |
https://jvn.jp/en/vu/JVNVU92279973/ | third party advisory |