Schneider Electric Modicon M221 PLCs and SoMachine Basic (Update A)
Schneider Electric Modicon M221 PLCs and SoMachine Basic contain multiple vulnerabilities (CWE-321, CWE-693) that allow remote code execution without authentication. The M221 is a compact programmable logic controller used in industrial control systems. SoMachine Basic is the engineering software for programming and configuring these PLCs. A remote attacker can exploit these vulnerabilities to execute arbitrary commands on affected systems, potentially bypassing cryptographic controls and validation mechanisms. Affected firmware versions: M221 <= 1.5.0.1, SoMachine Basic > 1.5.
- Network connectivity to the M221 PLC on port 502 (Modbus TCP or engineering interface port)
- No credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9ffeda22-f73d-49e3-b11d-88375103d7a4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.