Festo MSE6-C2M/D2M/E2M
Festo MSE6-C2M/D2M/E2M proportional solenoid valve controllers contain undocumented and incompletely documented test mode functions that are remotely accessible. These functions can be invoked by authenticated users to cause denial of service, loss of integrity, or malfunction of controlled processes. The underlying communication protocols do not meet current security standards. All versions of affected models are vulnerable; Festo has not released firmware patches and states the products are designed for sealed-off industrial networks only.
- Network reachability to the MSE6 controller on its active service port
- Valid engineering workstation credentials or operator credentials for the device
- Knowledge of the undocumented test mode command syntax (not publicly disclosed)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/46ca986a-6943-497d-91b1-5d626bba722bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.