2021-12-28 12:09:59
mitre
PUBLISHED
An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.