Schneider Electric Modicon Controllers and Software (Update A)
Multiple vulnerabilities in Schneider Electric Modicon controllers and EcoStruxure software allow arbitrary code execution and compromise of project file confidentiality and integrity. Affected products include Modicon M340 and M580 CPUs (all versions), EcoStruxure Process Expert (all versions), EcoStruxure Control Expert (versions prior to and including 15.0 SP1), and SCADAPack RemoteConnect for x70 (all versions). The vulnerabilities involve improper authentication (CWE-290), insecure deserialization (CWE-502), and insufficient cryptographic protection (CWE-311, CWE-522).
- Network access to the Modicon controller or EcoStruxure software (port and protocol depend on specific product, but typically Modbus TCP or proprietary protocols)
- No authentication required
- Controller or software must be reachable from attacker's network location
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2c941f31-643f-4a6e-a8d2-192687ebcf0bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.