Latest Schneider Electric vulnerabilities #

Our friends at CISA released advisories for a number of Schneider Electric ICS devices today through their Industrial Control Systems Advisories service, touching on Schneider Electric EcoStruxure Power Automation System (EPAS) (CVE-2025-0813, CVE-2025-1960, and CVE-2025-0002), ASCO Remote Annunciator (CVE-2025-1059), and Modicon PLC (CVE-2024-11737).

If you're in the business of power generation and distribution, you'll want to take a look at these. That said, all but one of these issues seems to come with some pretty convoluted attack scenarios, so you shouldn’t worry too much about them. However, the Modicon bug, CVE-2024-11737, is a protocol-level Modbus vulnerability, and does look worth worrying about, so read on for that.

What is the impact? #

CVE-2024-11737 is a vulnerability in how Modicon Controllers M241, M251, M258, and LMC058 parse malformed Modbus packets. In most cases, this can cause the device to go offline, but if the attacker is particularly crafty with their packets, it can lead to total system compromise with remote code execution.

Are updates or workarounds available? #

Schneider Electric has released an update for the M241 and M251 firmware for Modicon, and version 5.2.11.29 fixes the issue.

Unfortunately, there is no fix available yet for Modicon M258 and LMC058, but the usual advice applies: don't connect these devices to an untrusted network, use firewalls to filter IPs and affected Modbus ports, and if you're not expecting to use Modbus functionality, turn it off on affected devices.

How to find potentially vulnerable Schneider Electric devices with runZero #

From the Asset Inventory, use the following query to locate systems running potentially vulnerable firmware:

hw:="Schneider Electric M241" OR hw:="Schneider Electric M251" OR hw:="Schneider Electric M258" OR hw:="Schneider Electric LMC058"

January 2025: M580 and Quantum Modicon communications adapters #

Schneider Electric has reported a critical vulnerability in its M580 and Quantum Modicon communications adapters. These adapters are used in industrial control systems to allow communication with industrial control devices via industrial Ethernet.

This vulnerability is rated highly critical, with a CVSS score of 9.8.

The following devices are affected

  • Modicon M580 communication modules BMENOC BMENOC0321, versions prior to SV1.10
  • Modicon M580 communication modules BMECRA BMECRA31210, all versions
  • Modicon M580/Quantum communication modules BMXCRA BMXCRA31200, all versions
  • Modicon M580/Quantum communication modules BMXCRA BMXCRA31210, all versions
  • Modicon Quantum communication modules 140CRA 140CRA31908, all versions
  • Modicon Quantum communication modules 140CRA 140CRA31200, all versions

What is the impact? #

Successfully exploiting this vulnerability would allow an attacker to take complete control of the vulnerable system. This vulnerability can be exploited remotely and without authentication.

Are updates or workarounds available? #

Schneider Electric has released an update for the affected BMENOC modules. The BMECRA, BMXCRA, and 140CRA modules do not currently have updates available.

Users are advised to update as quickly as possible for any affected BMENOC modules. Users are also advised to isolate any potentially vulnerable modules from untrusted networks; in particular, UDP ports 67 and 68 should be blocked from unauthorized traffic.

How to find potentially vulnerable Schneider Electric devices with runZero #

From the Asset Inventory, use the following query to locate systems running potentially vulnerable firmware:

hw:"Schneider%BMENOC" OR hw:"Schneider%BMXCRA" OR hw:"Schneider%BMECRA" OR hw:"Schneider%140CRA"

Written by todb

Tod Beardsley is VP of Security Research at runZero, where he "kicks assets and fakes frames." Prior to 2025, he was the Section Chief for the Vulnerability Response section for CSD/VM/VRC at CISA, the Cybersecurity and Infrastructure Security Agency, part of the US government. He's also a founder and CNA point of contact for AHA!. He spends much of his time involved in vulnerability research and coordinated vulnerability disclosure (CVD). He has over 30 years of hands-on security experience, stretching from in-band telephony switching to modern ICS/OT implementations. He has held IT ops, security, software engineering, and management positions in large organizations such as the Rapid7, 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. He is also CVE Board member, a Travis County Election Judge in Texas, and an internationally-tolerated horror fiction expert.

More about todb

Written by Rob King

Rob King is the Director of Security Research at runZero. Over his career Rob has served as a senior researcher with KoreLogic, the architect for TippingPoint DVLabs, and helped get several startups off the ground. Rob helped design SC Magazine's Data Leakage Prevention Product of the Year for 2010, and was awarded the 3Com Innovator of the Year Award in 2009. He has been invited to speak at BlackHat, Shmoocon, SANS Network Security, and USENIX.

More about Rob King
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Explore more

Webcasts
The Unreasonable Effectiveness of Inside Out Attack Surface Management
HD Moore, founder of runZero (and previously Metasploit), presents new research that will forever redefine how you approach attack surface...
Webcasts
Safeguarding OT/ICS Assets: Insights from the U.S. Department of Energy
Security experts from the National Renewable Energy Lab’s (NREL) Clean Energy Cybersecurity Accelerator™ (CECA) program join runZero to discuss...
runZero Insights
Ensure compliance with DORA’s ICT risk framework using runZero
Learn how to uncover unmanaged and unknown assets— including IT, OT, and IoT— to meet DORA's hidden risk requirements using runZero.
Talks
DEF CON 32: SSHamble: Unexpected Exposures in SSH (Video)
This talk digs deep into SSH, the lesser-known implementations, many of the surprising security issues found along the way, and how to exploit them.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.

Discover the new era of exposure management!