Schneider Electric Serial Modbus Driver Buffer Overflow (Update A)
Schneider Electric Modbus Serial Driver contains a buffer overflow vulnerability (CWE-121) in how it processes Modbus protocol messages over serial connections. The vulnerability affects 16 related products including engineering suites (TwidoSuite, SoMachine, Unity Pro), OPC Factory Server, and dedicated Modbus Serial Driver packages for Windows XP, Vista, and 7. All affected products are legacy or end-of-life with no patches planned by the vendor. An attacker could exploit this by sending a malformed Modbus message to a workstation running the driver, potentially leading to code execution with the privileges of the engineering application.
- Network or serial access to the Windows workstation running the Modbus Serial Driver
- The driver must be actively processing Modbus traffic (listening on serial port or network interface)
- No authentication is required to send a Modbus message to trigger the overflow
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bfeb072c-387e-4321-b979-3919871e2e50Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.