EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety
Schneider Electric has identified authentication bypass vulnerabilities (CWE-294) in EcoStruxure Control Expert, EcoStruxure Process Expert, Modicon M340, M580, M580 CPU Safety, Modicon Momentum Unity M1E, and Modicon MC80. These programmable logic controllers and distributed control systems are susceptible to remote unauthorized access through malformed packets sent to the Ethernet interface without requiring valid credentials. Successful exploitation could allow an attacker to execute arbitrary commands, modify automation logic, or halt operations. The M580 and M580 CPU Safety have firmware patches available (sv4.20 and SV4.21 respectively). M340, the EcoStruxure software products, M1E, and MC80 have no announced fixes and must be protected through network access controls.
- Network access to the PLC's Ethernet port (typically port 502 or engineering ports)
- No authentication required - vulnerability does not require valid credentials
- Attacker must craft specific packet structure (CWE-294: Improper Authentication)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/833a0304-26b3-4d3a-88b7-636ee3df851c