Easergy T200
Easergy T200 RTU contains an authentication bypass vulnerability in control command processing. The vulnerability affects the Modbus TCP, IEC104, and DNP3 protocol interfaces used for electrical distribution network management. An attacker can send control commands to the RTU without proper authentication, potentially altering voltage settings, switching configurations, or other distribution parameters. The vulnerability requires no special privileges or user interaction and is remotely accessible over the network.
- Network access to the RTU on the affected protocol port (Modbus TCP port 502, IEC104 port 2404, or DNP3 port 20000)
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e2de9cd9-5e8e-49d7-ae25-1f639ba6116dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.