An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
References
Link | Resource |
---|---|
https://us.idec.com/idec-us/en/USD/Software-Downloads-Automation-Organizer | Vendor Advisory |
https://www.idec.com/home/lp/pdf/2021-12-24-PLC.pdf | Vendor Advisory |
https://us.idec.com/idec-us/en/USD/Programmable-Logic-Controller/Micro-PLC/FC6A-MicroSmart/c/MicroSmart_FC6A | Vendor Advisory |
https://jvn.jp/en/vu/JVNVU92279973/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Information
Published : 2021-12-28 05:15
Updated : 2022-01-07 12:40
NVD link : CVE-2021-37400
Mitre link : CVE-2021-37400
JSON object : View
CWE
CWE-522
Insufficiently Protected Credentials
Products Affected
idec
- windldr
- ft1a_smartaxix_pro_firmware
- microsmart_plus_fc6a_firmware
- ft1a_smartaxix_pro
- windedit
- microsmart_plus_fc6b
- microsmart_fc6a_firmware
- microsmart_plus_fc6a
- ft1a_smartaxix_lite
- microsmart_fc6b_firmware
- data_file_manager
- microsmart_fc6b
- microsmart_fc6a
- microsmart_plus_fc6b_firmware
- ft1a_smartaxix_lite_firmware