An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Data_file_manager | Idec | * | 2.12.1 (including) |
Windedit | Idec | * | 1.3.1 (including) |
Windldr | Idec | * | 8.19.1 (including) |