Siemens warns Stuxnet targets of password risk
Customers advised not to change the default passwords hard-coded into its WinCC Scada product, even though the malware is circulating.
Siemens has advised its customers not to change the default passwords hard-coded into its WinCC Scada product, even though the Stuxnet malware that exploits the critical infrastructure systems software is circulating in the wild.
Changing the passwords could affect the operations of critical infrastructure organizations such as utilities companies and electricity suppliers, according to Siemens.
"We will be publishing customer guidance shortly, but it won't include advice to change default settings as that could impact plant operations," said Siemens spokesman Michael Krampe in a statement on Monday.
Read more of "Siemens warns Stuxnet targets of Scada password risk" at ZDNet UK.