Third-Party vulnerability on Modicon Networking Managed Switches
Schneider Electric Modicon and Connexium Managed Switches are vulnerable to RADIUS protocol response forgery attacks. The vulnerability exists only when the RADIUS Server Message Authenticator option is disabled (non-default configuration). A network-positioned attacker can forge RADIUS responses to bypass authentication, modify valid responses (Access-Accept, Access-Reject, Access-Challenge), potentially causing denial of service or loss of confidentiality and integrity of connected devices. The default RADIUS configuration is not vulnerable; the Message Authenticator option must remain enabled to prevent exploitation.
- Network access to RADIUS authentication traffic (same network segment as switch and RADIUS server)
- RADIUS Message Authenticator option must be disabled on the affected switch (non-default configuration)
- Switch using RADIUS for authentication
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a07c6eeb-2678-4c11-97cf-af35e6f3d357Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.