Schneider Electric EcoStruxure Control Expert, EcoStruxure Process Expert, and Modicon M340, M580 and M580 Safety PLCs
Schneider Electric has identified multiple vulnerabilities affecting Modicon M340, M580, and M580 Safety PLCs, as well as EcoStruxure Control Expert and Process Expert software. The vulnerabilities stem from hardcoded credentials, weak authentication, and insecure credential storage (CWE-798, CWE-522, CWE-924). Exploitation could allow unauthorized access to PLCs, potentially resulting in denial of service, unauthorized process modifications, or loss of confidential process data. M340 and M580 Safety CPUs have firmware updates available. M580 non-Safety, MC80, and Momentum Unity M1E processors are end-of-life products with no fixes planned.
- Network access to the PLC or EcoStruxure workstation (typically on port 502 for Modbus or port 44818 for EtherNet/IP)
- PLC or software running affected version (M340 <SV3.60, M580 <SV4.20, M580 Safety <SV4.21, Control Expert <16.0, Process Expert <15.3_HF008)
- No valid credentials required (vulnerability related to hardcoded or default credentials, CWE-798)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f6572b04-5790-4830-a30d-d18350dc930fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.