All Bachmann M1 System Processor Modules
Bachmann M1 System Processor Modules (MX207, MX213, MX220, MC206, MC212, MC220, MH230) with MSYS v1.06.14 and later contain a vulnerability that allows an unauthenticated remote attacker to gain access to password hashes of the controller if Security Level 4 is not enabled. If Security Level 4 is properly configured, an authenticated remote attacker could still extract user credentials. The vulnerability affects the default security configuration and authentication mechanisms of these industrial controllers.
- Network access to the M1 controller (for unauthenticated hash extraction)
- M1 controller running MSYS v1.06.14 or later without Security Level 4 enabled (for unauthenticated exploitation)
- Valid controller credentials (required if Security Level 4 is properly configured)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4f4d4b4a-e0dd-484f-ac50-35ec8009d556Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.