ModiPwn: Critical vulnerability in Modicon PLCs bypasses security mechanisms.
See how you can reduce risk and downtime in your environment.
See how you can protect both IT & OT devices.
Armis researchers discovered a new vulnerability in Schneider Electric Modicon PLCs which bypasses security mechanisms. Their research analysis reveals the weak points which lack encryption and proper authentication mechanisms in PLCs commonly found in manufacturing and utility organizations environments.
The deficiencies found lead to vulnerabilities which have been discovered, patched, and re-patched time and time again, in a classic whack-a-mole cycle. This indefensible patchwork can lead to an adversary gaining native code execution.
Read the IT & OT for Industrial Environments whitepaper to understand real-world OT attack examples like this one and solve the technical challenges in today’s world of OT security.
Read the OT Security White Paper
Modicon PLC Risk Assessment
Ensure your organization takes timely and reasonable precautions to protect Modicon PLCs.Get Started
of organizations surveyed estimate that at least half of all devices in their enterprise are unmanaged or IoT devices.
Forrester State Of Enterprise IoT Security:
A Spotlight On Manufacturing, Commissioned Research
See Every Thing™.Every Device.
See a live demonstration of the Armis Agentless Device Security Platform.
Speak with an Expert
Get a one-on-one demo with one of our experts.
Request a Risk Assessment
See what the Armis Agentless Device Security Platform can find in your environment.