Users of IoT products from three major vendors at risk of DD

Users of IoT products from three major vendors at risk of DDoS attacks, data leaks


Matrikon Honeywell is one of three IoT vendors that faced vulnerabilities in their process to implement the open platform communication (OPC) network protocol ahead of a 2020 fix. (Spencer Platt/Getty Images)
At least nine vulnerabilities in the approach three leading IoT vendors used to implement the open platform communication (OPC) network protocol created conditions that could potentially expose product users to denial-of-service (DoS) attacks, remote code execution, and sensitive data leakage.
The three IoT vendors – Softing Industrial Automation GmbH, Kepware PTC, and Matrikon Honeywell – all provided fixes for their respective products after security firm Claroty privately disclosed them during 2020.
OPC functions as the middleman of operational technology (OT) networks, ensuring operability between industrial control systems (ICS) and proprietary devices, such as programmable logic controllers (PLCs) responsible for the correct operation of field devices. Standardized communication protocols such as OPC and its specifications guarantee that management and oversight of devices and processes can happen from a centralized server.

Related Keywords

Joseph Carson , Matrikon Honeywell , Industrial Control System Cyber Emergency Response Team , Softing Industrial Automation Gmbh , Heap Based Buffer Overflow , Uncontrolled Resource Consumption , ஜோசப் கார்சன் , தொழில்துறை கட்டுப்பாடு அமைப்பு சைபர் அவசரம் பதில் அணி , குவியல் அடிப்படையிலானது இடையக ஓவர்‌ஃப்லோ ,

© 2025 Vimarsana