Treck TCP/IP Vulnerabilities (Ripple20)
Schneider Electric products contain multiple vulnerabilities in the embedded Treck TCP/IP stack (Ripple20 family of flaws disclosed June 2020). These vulnerabilities affect Altivar variable frequency drives (machine and process models), TM3BC bus couplers, SCADAPack 32 RTU, Acti9 smart metering and building control modules, PowerLogic gateways, circuit breaker Ethernet interfaces, and motor controllers. Affected firmware versions range from legacy releases through recent versions depending on product line. Ripple20 flaws include out-of-bounds writes, DNS rebinding, and TCP option parsing defects that can result in remote code execution or denial of service. The vulnerabilities are actively exploited in the wild and require no authentication to attack.
- Network reachability to affected device on Ethernet or Modbus TCP port
- No authentication required to exploit the TCP/IP stack vulnerabilities
/api/v1/advisories/9bf856bb-ab7b-4362-b80f-207ffd947631