漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
AutomationDirect DirectLOGIC with Serial Communication Cleartext Transmission
漏洞信息
AutomationDirect DirectLOGIC is vulnerable to a specifically crafted serial message to the CPU serial port that will cause the PLC to respond with the PLC password in cleartext. This could allow an attacker to access and make unauthorized changes. This issue affects: AutomationDirect DirectLOGIC D0-06 series CPUs D0-06DD1 versions prior to 2.72; D0-06DD2 versions prior to 2.72; D0-06DR versions prior to 2.72; D0-06DA versions prior to 2.72; D0-06AR versions prior to 2.72; D0-06AA versions prior to 2.72; D0-06DD1-D versions prior to 2.72; D0-06DD2-D versions prior to 2.72; D0-06DR-D versions prior to 2.72;
漏洞信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
漏洞
敏感数据的明文传输
漏洞
AutomationDirect DirectLOGIC 安全漏洞
漏洞信息
AutomationDirect DirectLOGIC是美国AutomationDirect公司的一种可编程逻辑控制器。 AutomationDirect DirectLOGIC存在安全漏洞,该漏洞源于受到发送到CPU串行端口的特制串行消息的攻击,该消息将导致PLC以明文形式响应PLC密码。
漏洞信息
N/A
漏洞
N/A