EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers)
Schneider Electric has disclosed multiple vulnerabilities in EcoStruxure Control Expert, EcoStruxure Process Expert, and Modicon PLCs/PACs that allow unauthorized access without authentication. Successful exploitation could result in denial of service and loss of confidentiality and integrity of the controller. The vulnerability requires specific network conditions (high attack complexity) but no valid credentials to trigger. Modicon M340, M580, M580 Safety, Momentum Unity M1E, and MC80 have firmware fixes available. Legacy Modicon Quantum and Premium CPUs have no fix planned and remain vulnerable in all versions. EcoStruxure Process Expert has no fix available for any version.
- Network access to the PLC/PAC management interface or control port
- Specific network conditions that increase attack complexity (e.g., timing or state-dependent exploitation)
- No valid credentials required
- System must not have compensating network controls in place (firewall restrictions, network segmentation)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b3b3c14d-40bb-4935-8055-b4779467489b