ModiPwn: Critical vulnerability in Modicon PLCs bypasses security mechanisms.

See how you can reduce risk and downtime in your environment.

See how you can protect both IT & OT devices.

Armis researchers discovered a new vulnerability in Schneider Electric Modicon PLCs which bypasses security mechanisms. Their research analysis reveals the weak points which lack encryption and proper authentication mechanisms in PLCs commonly found in manufacturing and utility organizations environments.

The deficiencies found lead to vulnerabilities which have been discovered, patched, and re-patched time and time again, in a classic whack-a-mole cycle. This indefensible patchwork can lead to an adversary gaining native code execution.

Read the IT & OT for Industrial Environments whitepaper to understand real-world OT attack examples like this one and solve the technical challenges in today’s world of OT security.

Read the OT Security White Paper

Learn how the Armis platform keeps industrial control systems safe from threats and attacks.

modipwn-demo

Modicon PLC Risk Assessment

Ensure your organization takes timely and reasonable precautions to protect Modicon PLCs.

Get Started
73%

of organizations surveyed estimate that at least half of all devices in their enterprise are unmanaged or IoT devices.

Forrester State Of Enterprise IoT Security:
A Spotlight On Manufacturing, Commissioned Research

See Every Thing™.Every Device.
Every Connection.

See a live demonstration of the Armis Agentless Device Security Platform.

Speak with an Expert

Get a one-on-one demo with one of our experts.

Request a Risk Assessment

See what the Armis Agentless Device Security Platform can find in your environment.