EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2
A vulnerability in the IEC 61850 communication driver used by EcoStruxure Power Operation 2021 and EcoStruxure Power SCADA Operation 2020/2020 R2 can be exploited remotely via specially crafted protocol messages. The flaw causes an improper memory access (CWE-824) that crashes the driver, resulting in loss of communication to substations and downstream power control devices. Affected versions include all maintenance updates of these releases. Schneider Electric has not provided a permanent fix for these product versions and recommends only the driver package update as available remediation.
- Network access to the EcoStruxure host on the port used by the IEC 61850 driver (typically port 102)
- The IEC 61850 driver must be active and listening for incoming connections
- No authentication required to send malformed packets
Patching may require device reboot — plan for process interruption
/api/v1/advisories/92b56fda-524c-4bfc-94e7-c40b1a0be487Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.