OPTO 22 SNAP PAC S1
OPTO 22 SNAP PAC S1 firmware version R10.3b contains multiple vulnerabilities: - Weak password brute-force protection allows attackers to guess credentials on the web server (port 443) and FTP service (port 21) - Improper access controls allow unauthenticated attackers to access certain device files after authentication - Resource exhaustion conditions can cause denial-of-service, making the controller unresponsive These vulnerabilities affect the SNAP PAC S1, a widely-deployed industrial automation controller used in critical infrastructure. Successful exploitation could allow unauthorized modification of control logic, process setpoints, or device configurations, or could disrupt operations by making the device unavailable.
- Network access to SNAP PAC S1 on TCP port 443 (HTTPS) or TCP port 21 (FTP)
- Weak or default credentials on the device
- Built-in web server enabled (default state)
/api/v1/advisories/745995db-0202-42b6-8c6b-5c2adbb9670eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.