Countermeasure for password function vulnerability of PLCs 2022.11.18
1. Overview A vulnerability has been discovered that could allow a remote or local third party to steal passwords when using the password function in our PLC products. If you are using the password function of the relevant PLC, please check the contents and take the following measures.
2. Vulnerability Vulnerability 1: Responding to confidential information via serial communication The PLC is vulnerable to specially crafted communication commands to the serial communication port. This causes the PLC to return password information.
Vulnerability 2: Responding to confidential information via Ethernet communication The PLC is vulnerable to specially crafted Ethernet packets via the PLC’s built-in Ethernet port or ECOM module. This causes the PLC to return password information.
3. Impact If a password or other information is intentionally stolen using this vulnerability, it may lead to the theft of PLC programs, leakage of confidential information of the equipment or machinery, or unauthorized operation of the equipment.
4. Countermeasures PLC series currently available can be made countermeasures with updating its software. If software updates cannot or will not be performed, a combination of Mitigation Measure 1 (described below) and Mitigation Measure 2 (for some models) can be used to reduce the impact of the vulnerability. For information on software updates, please contact us.
Inquiries Concerning Technical Issues
For PLC series that have already been discontinued, the impact of the vulnerability can be reduced by the following Mitigation Measure1.
Mitigation Measure 1: For Ethernet communication, do not connect to external network, but only to a secure local network, or connect to a secure network isolated by a firewall.
Mitigation Measure 2: When setting a password on the PLC, do not leave the password open.Lock it with the password and turn ON bit 15 of the designated register for security enhancement to prohibit reading of the password (depending on the PLC model).
In addition if there are no devices connected to the communication port and the port is physically locked to prevent unspecified persons from accessing unused ports, there is no need to take countermeasures by updating the software. No software countermeasures are required if the password function is not used.
5. Target PLC series The countermeasures should apply to the following PLC series when the password function is used.
(see image attached)
6. Credit This vulnerability was discovered by: Sam Hanson (DRAGOS, INC.)
Notice of discontinuation of
Programmable cam FC2 series
We sincerely appreciate your patronage.
The FC2 series you purchased has become extremely difficult to sell due to the
discontinuation of the main parts used or the difficulty in obtaining parts.
Therefore, we will discontinue sales depending on the model number and stock status.
We apologize for the inconvenience.
August 2021
Koyo Electronics Industries Co., Ltd