Hard-coded key vulnerability in Logix PLCs has severity score of 10 out of 10

Source: Ars Technica

Article note: Oh that's bad. Remotely-usable hard-coded admin credential. PLCs were doing shitty IoT behavior before IoT was a thing. At least most of them are jailed on isolated control networks because everyone _knows_ they're chickenshit, but it still makes a hell of an escalation path.
Hard-coded key vulnerability in Logix PLCs has severity score of 10 out of 10

Enlarge (credit: Rockwell Automation)

Hardware that is widely used to control equipment in factories and other industrial settings can be remotely commandeered by exploiting a newly disclosed vulnerability that has a severity score of 10 out of 10.

The vulnerability is found in programmable logic controllers from Rockwell Automation that are marketed under the Logix brand. These devices, which range from the size of a small toaster to a large bread box or even bigger, help control equipment and processes on assembly lines and in other manufacturing environments. Engineers program the PLCs using Rockwell software called Studio 5000 Logix Designer.

On Thursday, the US Cybersecurity & Infrastructure Security Administration warned of a critical vulnerability that could allow hackers to remotely connect to Logix controllers and from there alter their configuration or application code. The vulnerability requires a low skill level to be exploited, CISA said.

Read 9 remaining paragraphs | Comments

This entry was posted in News. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *