Schneider Electric Triconex TriStation and Tricon Communication Module
Multiple vulnerabilities in Schneider Electric Triconex TriStation 1131 and Tricon Communications Module allow an attacker to view cleartext network data, cause denial of service, or gain improper access to safety controllers. TriStation 1131 affected versions range from 1.0.0 through 4.12.0 on Windows NT, XP, or Windows 7. Tricon Communications Modules (TCM 4351, 4352, 4351A/B, 4352A/B) affected versions range from 10.0 through 10.5.3. Vulnerabilities include unencrypted communications (CWE-319), denial of service (CWE-400), missing security features (CWE-912), and inadequate access controls (CWE-284).
- Network access to TriStation 1131 engineering workstation or Tricon Communications Module (TCM) on ports used for controller communication
- No authentication required for exploitation of cleartext data transmission
- Device must be reachable from attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/dd7714cc-a353-4105-81dd-fd04e7b3f12fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.