An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Data_file_manager | Idec | * | 2.12.1 (including) | 
| Windedit | Idec | * | 1.3.1 (including) | 
| Windldr | Idec | * | 8.19.1 (including) |