Schneider Electric Triconex Tricon
Schneider Electric Triconex Tricon MP Model 3008 (firmware versions 10.0–10.4) contains vulnerabilities that could allow arbitrary code execution and compromise of safety instrumented systems. The HatMan malware exploits these vulnerabilities to alter process parameters, disable safety functions, or shut down operations. Exploitation requires unrestricted network access to the safety network and physical access to set the Tricon key switch to "PROGRAM" mode. Schneider Electric recommends upgrading to Tricon CX v11.4 or later, which includes IEC 62443 compliance and enhanced security controls. For detection and remediation, users should contact Schneider Electric support to analyze systems for malware presence.
- Unrestricted network access to the Tricon safety network
- Physical access to the Tricon controller or an engineering workstation on the safety network
- Tricon key switch set to PROGRAM mode (attacker can set this if physical access is available)
- No air gap or network segmentation between attacker and safety network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e86abdd1-e8c8-430d-a102-e11523a85532