Schneider Electric Modicon Premium, Modicon Quantum, Modicon M340, and Modicon BMXNOR0200
Schneider Electric Modicon PLCs (Premium, Quantum, M340, and BMXNOR0200) contain multiple vulnerabilities in cryptographic implementations and credential management. The devices use weak cryptographic algorithms (CWE-327), hardcoded credentials (CWE-798), and are vulnerable to buffer overflow attacks (CWE-121). These flaws allow an attacker with network access and engineering credentials to execute unauthorized commands, modify control logic, or crash the PLC. No firmware patches are available from the vendor for any affected product line.
- Network access to the PLC from engineering workstation segment or Internet if not firewalled
- Valid engineering credentials or ability to use hardcoded default credentials
- Access to engineering communication port (typically port 502 for Modbus)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/71374e0d-448f-4fc4-a88a-1c9a78bff3a6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.