See how you can reduce risk and downtime in your environment.
Armis researchers discovered a new vulnerability in Schneider Electric Modicon PLCs which bypasses security mechanisms. Their research analysis reveals the weak points which lack encryption and proper authentication mechanisms in PLCs commonly found in manufacturing and utility organizations environments.
The deficiencies found lead to vulnerabilities which have been discovered, patched, and re-patched time and time again, in a classic whack-a-mole cycle. This indefensible patchwork can lead to an adversary gaining native code execution.
Read the IT & OT for Industrial Environments whitepaper to understand real-world OT attack examples like this one and solve the technical challenges in today’s world of OT security.
Ensure your organization takes timely and reasonable precautions to protect Modicon PLCs.Get Started
Forrester State Of Enterprise IoT Security:
A Spotlight On Manufacturing, Commissioned Research
See a live demonstration of the Armis Agentless Device Security Platform.
Get a one-on-one demo with one of our experts.
See what the Armis Agentless Device Security Platform can find in your environment.