Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers)
Schneider Electric has identified multiple denial of service vulnerabilities in Modicon PLCs and PACs (M340, M580, M580 Safety, Momentum Unity M1E, MC80, Premium, and Quantum CPUs) that can cause the controller CPU to stop processing control logic. The vulnerability is triggered by sending a specially crafted request to the controller and requires no authentication. Exploitation would halt all automation and process control operations until the device is manually recovered. Several legacy product lines (Premium and Quantum) have no firmware patch available from the vendor.
- Network access to the Modicon PLC communication port (port 502 for Modbus TCP or equivalent serial access)
- No authentication required to send the malicious request
Patching may require device reboot — plan for process interruption
/api/v1/advisories/200da5e1-8da9-4c07-a3eb-6ae52de92750Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.