{"id":12355,"date":"2020-12-29T00:59:50","date_gmt":"2020-12-29T00:59:50","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=12355"},"modified":"2026-04-17T18:07:47","modified_gmt":"2026-04-17T18:07:47","slug":"a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/","title":{"rendered":"A Preliminary Investigation into the Worm Technique Affecting Schneider&#8217;s Programmable Logic Controllers"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Background<\/h2>\n\n\n\n<p>Some time ago, some researchers detected a code injection vulnerability (CVE-2020-7475), which could cause Schneider&#8217;s Programmable Logic Controllers (PLCs) to operate like worms. If successfully exploited, this vulnerability could allow a PLC to act as a mini PC to carry out malicious network activities or as an intranet springboard or a network scanner to penetrate into industrial systems in a more covert manner.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">Design Flaw<\/h2>\n\n\n\n<p>The vulnerability is caused by obvious design flaws. The following paragraphs will elaborate on the root cause of the vulnerability from the perspective of configuration program design in Siemens and Schneider PLCs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Siemens PLCs<\/h3>\n\n\n\n<p>Siemens S7 PLCs provide different ways of PLC configuration programming, such as schematic expression in the Ladder Diagram (LAD) or Function Block Diagram (FBD), Pascal-like Structured Control Language (SCL), and assembly-like Statement List (STL). Regardless of the types of input sources, the PLC program will be compiled into MC7 bytecode, an even lower-level representation of STL.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"775\" height=\"453\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12358\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-1.jpg 775w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-1-300x175.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-1-768x449.jpg 768w\" sizes=\"(max-width: 775px) 100vw, 775px\" \/><\/figure><\/div>\n\n\n\n<p>After being compiled by configuration software, project files (in MC7 format) are downloaded and installed into a PLC via Siemens&#8217;s S7COMM\/S7COMM-PLUS protocol. Then, the MC7 virtual machine in the PLC will dispatch the files and interpret and execute MC7 bytecode. Since the virtual machine can restrict the resources accessed by programs, the complied bytecode can only be used for access to the resources provided by the virtual machine rather than direct hardware operation, such as establishing Transmission Control Protocol (TCP) connections via TCON and TDISCON in FB blocks to send and receive data. This is to say, complied configuration programs are capable of launching malicious network activities.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"495\" height=\"520\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-2-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12360\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-2-1.jpg 495w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-2-1-286x300.jpg 286w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/figure><\/div>\n\n\n\n<p>Siemens does not document MC7 bytecode, of which assembly instructions can only be understood upon reverse engineering. Fortunately, a JEB plug-in has been developed to disassemble and even decompile MC7 files to figure out code logic in configuration programs. This works especially well in analyzing Stuxnet and other worm viruses targeting Siemens devices.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"595\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-3-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12362\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-3-1.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-3-1-300x174.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-3-1-768x446.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Schneider PLCs<\/h3>\n\n\n\n<p>In Schneider PLCs, the Ladder Diagram (LAD), Structured Text (ST), and FBD are compiled into Architecture Reference Manual (ARM) machine code that is directly executed by an ARM processor, thus providing full access to both software and hardware resources in the PLCs.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"518\" height=\"331\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12363\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-4.jpg 518w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-4-300x192.jpg 300w\" sizes=\"(max-width: 518px) 100vw, 518px\" \/><\/figure><\/div>\n\n\n\n<p>After being compiled by configuration software of Schneider, project files can be directly downloaded and installed into a PLC via Schneider&#8217;s ModBus 90 function code (UMAS protocol). After being enabled, the PLC will execute the compiled ARM machine code. If injecting malicious code into ARM bytecode, attackers can totally control the PLC and gain control over the access to critical resources, such as the network, file system, and hardware IO.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"481\" height=\"382\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-5-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12365\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-5-1.jpg 481w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-5-1-300x238.jpg 300w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability Details<\/h2>\n\n\n\n<p>The root cause of the vulnerability is that Schneider PLCs directly compile configuration programs into ARM machine code and do not restrict the resources accessed by the programs during code execution. Therefore, worm viruses targeting Schneider PLCs may be more covert and destructive.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Unity Pro Reverse Engineering<\/h3>\n\n\n\n<p>Unity Pro is configuration programming software designed for Schneider PLCs. Places for code compilation should be first found to inject code into the compiled ARM code. As shown in the following figure, the exported function MyAsmArmStream of asmarm.dll compiles ARM assembly code into ARM machine code.<\/p>\n\n\n\n<p>When the first parameter of the function points to the ARM assembly string, the compiled ARM machine code data is returned:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"467\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-6-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12367\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-6-1.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-6-1-300x234.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure><\/div>\n\n\n\n<p>Test code can be written to locate the code written by users in ARM assembly.<\/p>\n\n\n\n<p>The code generated will definitely contain the immediate operand 1000 (0x3e8). Find the immediate operand, and you will quickly locate user code in configuration programs and obtain corresponding assembly code.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"481\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-7-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12369\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-7-1.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-7-1-300x241.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure><\/div>\n\n\n\n<p>Hook the function and modify the uploaded assembly code, and you can execute arbitrary code in Schneider PLCs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Code Writing<\/h3>\n\n\n\n<p>Schneider PLCs use Vxworks operating system, which provides the functions needed. All that is needed is to find the function addresses (such as network access, account management, and file access) in the firmware and directly invoke the functions in ARM assembly.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"409\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-8-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12371\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-8-1.jpg 700w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-8-1-300x175.jpg 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p>Documents about prototypes of these functions are available on the official website. All that is needed is to construct parameters properly before invocation. For example, the loginUserAdd function in the following figure allows adding an account. Attackers could add a backdoor account to a PLC via the function.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"534\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-9-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12373\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-9-1.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-9-1-300x156.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-9-1-768x401.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Exploitation Procedure<\/h3>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Rename the original asmArm.dll to asm_Arm.dll to facilitate invoking the custom dynamic-link library (DLL).<\/li><li>Put malicious asmArm.dll (this DLL mainly hijacks MyAsmArmStream, modifies the uploaded ARM assembly code, and invokes the original asmArm.dll) into the Unity file folder.<\/li><li>Run Unity and load the PLC project.<\/li><li>Recompile the project.<\/li><li>Stop PLCs.<\/li><li>Upload the project to the PLCs.<\/li><li>Malicious code will be executed after PLCs are started.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability Fixing<\/h2>\n\n\n\n<p>Schneider has released a security advisory that provides security patches and recommendations. Repair of the SCADA mainly involves the check of the integrity of components. If a certain component is modified, the software will not be started and must be reinstalled.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"343\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-10-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12375\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-10-1.jpg 700w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1229-10-1-300x147.jpg 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p>Strictly speaking, this is only a mitigation measure. Since many techniques could bypass security checks, it is not easy to repair design flaws by means of software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>The article mainly discusses the root cause of the vulnerability (CVE-2020-7475) affecting Schneider&#8217;s PLCs and briefly describes the vulnerability principle and some ideas about vulnerability exploitation. Predictably, it is not easy to eradicate the vulnerability, and it is possible to work around the vulnerability via other technical methods. This also indicates that security needs to be considered in the implementation and preliminary design of industrial control systems and throughout the whole life cycle.<\/p>\n\n\n\n<p><strong>Reference link:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-airbus-cybersecurity\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/airbus-cyber-security.com\/applying-a-stuxnet-type-attack-to-a-modicon-plc\/\n<\/div><\/figure>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Background Some time ago, some researchers detected a code injection vulnerability (CVE-2020-7475), which could cause Schneider&#8217;s Programmable Logic Controllers (PLCs) to operate like worms. If successfully exploited, this vulnerability could allow a PLC to act as a mini PC to carry out malicious network activities or as an intranet springboard or a network scanner to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10296,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,5],"tags":[761],"class_list":["post-12355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ddos-mitigation","tag-worm-technique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Preliminary Investigation into the Worm Technique Affecting Schneider&#039;s Programmable Logic Controllers - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Preliminary Investigation into the Worm Technique Affecting Schneider&#039;s Programmable Logic Controllers - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Background Some time ago, some researchers detected a code injection vulnerability (CVE-2020-7475), which could cause Schneider&#039;s Programmable Logic\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-29T00:59:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0414-2.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"A Preliminary Investigation into the Worm Technique Affecting Schneider&#039;s Programmable Logic Controllers - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Background Some time ago, some researchers detected a code injection vulnerability (CVE-2020-7475), which could cause Schneider&#039;s Programmable Logic\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0414-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"A Preliminary Investigation into the Worm Technique Affecting Schneider&#8217;s Programmable Logic Controllers\",\"datePublished\":\"2020-12-29T00:59:50+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/\"},\"wordCount\":944,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0414-2.jpg\",\"keywords\":[\"Worm Technique\"],\"articleSection\":[\"Blog\",\"DDoS Mitigation\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/\",\"name\":\"A Preliminary Investigation into the Worm Technique Affecting Schneider's Programmable Logic Controllers - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0414-2.jpg\",\"datePublished\":\"2020-12-29T00:59:50+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0414-2.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0414-2.jpg\",\"width\":737,\"height\":355,\"caption\":\"Digital network with binary code and icons.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Preliminary Investigation into the Worm Technique Affecting Schneider&#8217;s Programmable Logic Controllers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Preliminary Investigation into the Worm Technique Affecting Schneider's Programmable Logic Controllers - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"A Preliminary Investigation into the Worm Technique Affecting Schneider's Programmable Logic Controllers - NSFOCUS","og_description":"Background Some time ago, some researchers detected a code injection vulnerability (CVE-2020-7475), which could cause Schneider's Programmable Logic","og_url":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/","og_site_name":"NSFOCUS","article_published_time":"2020-12-29T00:59:50+00:00","article_modified_time":"2026-04-17T18:07:47+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0414-2.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"A Preliminary Investigation into the Worm Technique Affecting Schneider's Programmable Logic Controllers - NSFOCUS","twitter_description":"Background Some time ago, some researchers detected a code injection vulnerability (CVE-2020-7475), which could cause Schneider's Programmable Logic","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0414-2.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"A Preliminary Investigation into the Worm Technique Affecting Schneider&#8217;s Programmable Logic Controllers","datePublished":"2020-12-29T00:59:50+00:00","dateModified":"2026-04-17T18:07:47+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/"},"wordCount":944,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0414-2.jpg","keywords":["Worm Technique"],"articleSection":["Blog","DDoS Mitigation"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/","url":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/","name":"A Preliminary Investigation into the Worm Technique Affecting Schneider's Programmable Logic Controllers - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0414-2.jpg","datePublished":"2020-12-29T00:59:50+00:00","dateModified":"2026-04-17T18:07:47+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0414-2.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0414-2.jpg","width":737,"height":355,"caption":"Digital network with binary code and icons."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/a-preliminary-investigation-into-the-worm-technique-affecting-schneiders-programmable-logic-controllers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"A Preliminary Investigation into the Worm Technique Affecting Schneider&#8217;s Programmable Logic Controllers"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=12355"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12355\/revisions"}],"predecessor-version":[{"id":32697,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12355\/revisions\/32697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10296"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=12355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=12355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=12355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}