An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
idec data file manager |
||
idec windedit |
||
idec windldr |
||
idec microsmart_plus_fc6b_firmware |
||
idec microsmart_plus_fc6a_firmware |
||
idec microsmart_fc6b_firmware |
||
idec microsmart_fc6a_firmware |
||
idec ft1a_smartaxix_pro_firmware |
||
idec ft1a_smartaxix_lite_firmware |