IDEC Products (Update A)
Two security vulnerabilities in IDEC MICROSmart and SmartAXIS industrial control modules: 1. Plaintext transmission of sensitive authentication information during communication protocols. An attacker with network access could capture user credentials in transit. 2. Predictable identification values (IDs) used in communication exchanges. An attacker could forge or manipulate messages by predicting these IDs, potentially disrupting communications or impersonating legitimate devices. Affected products: FC6A/FC6B Series MICROSmart All-in-One and Plus CPU modules, FT1A Series SmartAXIS Pro/Lite controllers, and SX8R Bus Coupler modules. All versions up to specified dates are vulnerable.
- Network access to the IDEC controller or the network segment where it communicates
- Ability to perform packet capture or injection (passive sniffer or active man-in-the-middle position on the network segment)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/84a9cf5e-5038-4b1a-8e6f-60cb91dceb34Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.