An attacker may obtain the user credentials from the...
Critical severity
Unreviewed
Published
Dec 29, 2021
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Dec 28, 2021
Published to the GitHub Advisory Database
Dec 29, 2021
Last updated
Feb 3, 2023
An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
References