AUTHENTICATION BYPASS BY SPOOFING CWE-290
An attacker could spoof arbitrary messages or execute commands.
AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294
An attacker could monitor traffic between the PLC and the controller, and replay requests that could result in the opening and closing of industrial valves.
UNRESTRICTED EXTERNALLY ACCESSIBLE LOCK CWE-412
The software properly checks for the existence of a lock, but the lock can be externally controlled or influenced by an actor that is outside of the intended sphere of control.
https://www.us-cert.gov/ics/advisories/icsa-19-346-02