Schneider Electric Modicon Controllers M241, M251, M258, and LMC058
Schneider Electric Modicon Controllers M241, M251, M258, and LMC058 contain cross-site scripting (XSS) and open redirect vulnerabilities in their web interfaces. Successful exploitation could allow an attacker with valid credentials to inject malicious code or craft redirects that steal user session tokens, potentially leading to account takeover and unauthorized modification of controller logic and machine parameters. M241 and M251 controllers have firmware fixes available (version 5.4.13.12), while M258 and LMC058 have no patch planned and must rely on network controls and operational mitigations.
- Valid credentials to the controller's web interface
- Network access to HTTP (port 80) or HTTPS (port 443)
- User interaction required (victim must visit the controller web page or click a malicious link)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/47265982-f9b3-41bf-9281-49f78a1960abGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.