CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
Lifecycle Timeline
2DescriptionNVD
The underlying PLC of the device can be remotely influenced, without proper safeguards or authentication.
AnalysisAI
Unauthenticated remote attackers can manipulate the underlying PLC controller on affected devices due to missing authentication controls, enabling modification of device operations and potential service disruption. The vulnerability requires no user interaction and can be exploited over the network, with no official patch currently available to mitigate the risk.
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Identify and inventory all affected devices in production and non-production environments; isolate critical systems to air-gapped or restricted networks if operationally feasible. Within 7 days: Implement network segmentation to restrict PLC access to authorized engineering stations only; deploy network monitoring to detect unauthorized PLC communication attempts; brief operational teams on manual safety procedures. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today