An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
28/12/2021
by Idec
a year ago
by Idec
a year ago
by Idec
a year ago
by Idec
a year ago
by Idec
a year ago
by Idec
a year ago
by Idec
a year ago
by Idec
a year ago
by Idec
a year ago