Schneider Electric Modicon Controllers (Update A)
This is a cross-site scripting (XSS) vulnerability in Schneider Electric Modicon Controllers' web interface. An attacker can inject arbitrary JavaScript that executes in the browser of an engineer accessing the controller remotely. This could allow theft of session credentials or further compromise of the engineering workstation. Affected models are M262, M258/LMC058, M241, and M251. M262 and M258/LMC058 have firmware fixes available through EcoStruxure Machine Expert v2.2.2. M241 and M251 do not have fixes planned.
- Network access to the engineering workstation running EcoStruxure Machine Expert or to the Modicon controller's web interface
- Ability to inject payload into web traffic (e.g., via MITM or compromised intermediate system)
- Engineer user must visit the page containing the injected payload
- Affected firmware versions below stated thresholds running on target controller
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4582ffe7-1042-4d07-b7df-ac6b5cf40932Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.