Documenting the full attack chain against unauthenticated Modbus/TCP installations: unit enumeration, coil read, register dump, and write primitives for HMI setpoint manipulation.
Modbus/TCP operates on port 502 with no authentication mechanism defined in the protocol specification. Any client that can reach the port can read and write all registers and coils. The protocol was designed for serial RS-485 networks in the 1970s and later wrapped in TCP with no security additions.
The full attack sequence against a typical Modbus/TCP PLC or RTU:
Network segmentation remains the primary defense. Place Modbus devices on isolated VLANs with strict firewall rules. Deploy Modbus-aware IDS rules to detect unauthorized write operations. Where possible, use Modbus/TCP Security (TLS wrapping defined in the 2018 specification update), though vendor support remains limited.