WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Another Stuxnet-Style Vulnerability Affecting More PLCs
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Another Stuxnet-Style Vulnerability Affecting More PLCs

Author: Jennifer Walker

Created: Thursday, May 7, 2020 - 16:35

Categories: Cybersecurity, General Security and Resilience

In the Security & Resilience Update for March 31, 2020, WaterISAC reported on research related to the potential for more Stuxnet-style attacks against PLCs. Airbus Cybersecurity reported a similar Stuxnet-like vulnerability in Schneider Electric’s EcoStruxure Control Expert engineering software. The flaw could be exploited to upload malicious code by replacing one of the DLL files, which could lead to process disruptions and other damage. In March it was noted that exploits could also affect similar products from other vendors. Today, SpiderLabs Global OT/IoT researchers at cybersecurity firm Trustwave present findings on two additional Stuxnet-style vulnerabilities on SoMachine Basic v1.6 and Schneider Electric M221 (Firmware 1.6.2.0) PLC. Exploitation of the first vulnerability (CVE-2017-6034) results in the inability of the engineering software to control and track the status of the PLC and gives an attacker the ability to establish an unauthenticated session to the PLCs to send control commands (e.g. START, STOP, UPLOAD, DOWNLOAD). The second vulnerability (CVE-2020-7489) would allow manipulated packets to be sent to the PLC due to lack of adequate checks on critical values used in communications with the PLC. While Schneider Electric has patched these vulnerabilities through coordination with Trustwaves’s Responsible Disclosure program, the details are notable for OT operators and engineers in understanding potential exploitation and highlighting the importance of the prioritization of vendor/OEM recommended mitigations. Read more at Trustwave

Related Resources

Members Only

(TLP:AMBER) April 22, 2026 WaterISAC Cyber Resilience Briefing

Apr 23, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) WaterISAC Notification – CISA Issues Cyber Alert ​​for Supply Chain Compromise Impacting Axios Node Package Manager​

Apr 20, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 17, 2026)

Apr 17, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar