An attacker may obtain the user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
28/12/2021
by Idec
2 years ago
by Idec
2 years ago
by Idec
2 years ago
by Idec
2 years ago
by Idec
2 years ago
by Idec
2 years ago
by Idec
2 years ago
by Idec
2 years ago
by Idec
2 years ago