Modicon M100/M200/M221 Programmable Logic Controller
The Modicon M100, M200, and M221 Nano Programmable Logic Controllers contain multiple vulnerabilities related to weak cryptographic practices and insufficient authentication mechanisms (CWE-326, CWE-334, CWE-311, CWE-200, CWE-760). These devices are susceptible to authentication replay attacks, whereby an attacker who captures network traffic between a programming workstation and the PLC can replay the authentication sequence to gain unauthorized control. This could allow an attacker to reprogram the PLC or alter its operation without legitimate credentials. Schneider Electric has not released patches for any of the affected product lines and does not plan to address these vulnerabilities with firmware updates.
- Network access to the PLC on the same local network segment or via a routed connection
- Ability to capture or intercept network traffic between programming workstation and PLC
- Knowledge of the PLC's network address and communication protocol
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d5785375-c1ce-430b-886b-44b6f723a693