Schneider Electric Modicon M340, MC80, and Momentum Unity M1E (Update B)
Multiple vulnerabilities exist in Schneider Electric Modicon PAC controllers (M340, MC80, Momentum M1E) that result from improper input validation (CWE-20) and memory handling errors (CWE-119). These flaws allow remote, unauthenticated attackers to achieve code execution on the controller, potentially enabling denial of service, unauthorized process modification, and loss of system confidentiality and integrity. Modicon controllers are used to monitor and control critical industrial operations. Schneider Electric has released firmware patches for all three affected product lines as of January 2026.
- Network access to the controller's Ethernet interface or industrial protocol port
- No authentication required
- Controller running vulnerable firmware version (Modicon M340 < SV3.65, MC80 < SV2.1, Momentum M1E < SV2.80)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/72ef792e-4257-4ca9-95e7-e1d04e8dd0f9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.