Intrusions leveraging the flaw against impacted modules on the 1756 chassis containing the devices’ communication processors, controllers, and I/O modules could result in the execution of common industrial protocol commands enabling the alteration of controller user projects and/or device configurations, a report from Claroty revealed. “We found a vulnerability that allowed an attacker to bypass the trusted slot feature, jumping between local backplane slots within a 1756 chassis using CIP routing, traversing the security boundary meant to protect the CPU from untrusted cards.
Source: SC Magazine