A remote attacker is able to read and modify captured data during a Man-in-the-Middle attack, because the affected software uses ISaGRAF eXchange Layer* protocol, which is unencrypted by design. *ISaGRAF eXchange Layer (IXL) is Rockwell Automation's proprietary system protocol. Programming software ISaGRAF Workbench communicates over the protocol with based on ISaGRAF Runtime devices to manage program (resources) on the devices and to control the devices itself.

Filter

Select a date

Search by vendor

Select a date

Search by vendor

Filter