An attacker may obtain the user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the PLC user program may be uploaded, altered, and/or...
9.8CVSS
9.4AI Score
0.004EPSS
An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or...
9.8CVSS
9.4AI Score
0.004EPSS