Modicon Controllers, EcoStruxure™ Control Expert and Unity Pro Programming Software
A code injection vulnerability exists in Schneider Electric's Modicon M340 and M580 programmable controllers and EcoStruxure Control Expert programming software. An attacker with network access to a vulnerable controller can inject malicious code through crafted project files, allowing arbitrary code execution on the controller. The vulnerability affects Modicon M340 firmware prior to V3.20, Modicon M580 firmware prior to V3.10, EcoStruxure Control Expert all versions prior to V15.0, and Unity Pro all versions. Researchers from Airbus Cybersecurity identified that similar vulnerabilities likely affect multiple other industrial automation vendors. Remediation requires updating firmware on controllers and software on engineering workstations, implementing application passwords, and implementing network segmentation to restrict access to port 502/TCP.
- Network access to Modicon controller on port 502/TCP
- Ability to send crafted project files to the controller
- Controller firmware prior to patched versions
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a4e0537e-0434-49b7-a81e-9d99d26bbab2