Atlas Copco Power Focus 6000
Atlas Copco Power Focus 6000 devices (all versions) contain information disclosure and session hijacking vulnerabilities (CWE-312, CWE-334, CWE-319). The vulnerabilities allow unauthenticated attackers with network access to capture sensitive configuration or credential data and hijack active user sessions. Successful exploitation results in loss of sensitive information and unauthorized takeover of an operator's active session. Atlas Copco has not provided patches or committed to remediation. No public exploits are currently known, but attack complexity is low.
- Network path to the Power Focus 6000 device
- Ability to intercept network traffic (MITM position or compromised network segment)
- User must be actively logged into the device for session hijacking
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bc6f4c0e-7e1f-4873-b496-56441759354dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.