Schneider Electric EcoStruxure Control Expert, Process Expert, Modicon M340, M580 and M580 CPU
A vulnerability in Schneider Electric Modicon controllers allows an attacker to execute unauthorized Modbus functions by hijacking an authenticated Modbus session. The affected products include EcoStruxure Control Expert (all versions), EcoStruxure Process Expert (v2020 and earlier), Modicon M340, M580, M580 Safety, Momentum Unity M1E, and MC80 controllers. All versions of these products except EcoStruxure Process Expert v2021 lack fixes. The vulnerability affects Modbus protocol communication on port 502/TCP between engineering workstations and PLCs. Successful exploitation allows an unauthenticated attacker on the network to inject unauthorized commands into running processes after hijacking an authenticated session.
- Network access to port 502/TCP on the affected PLC
- Ability to sniff or intercept Modbus traffic between engineering workstation and PLC (same network segment or compromised network device)
- Active authenticated Modbus session between the engineering software and controller
- No application password set on the PLC (optional, makes hijacking easier)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ea4ca298-beb4-4f9b-a803-20cee2d0e5da