Authentication Bypass Vulnerability in Schneider Electric EcoStruxure Products
CVE-2021-22779
Key Information:
- Vendor
- Schneider Electric
- Vendor
- CVE Published:
- 14 July 2021
Summary
A significant vulnerability exists in various Schneider Electric EcoStruxure products, enabling attackers to exploit an authentication bypass by spoofing the Modbus communication. This flaw allows unauthorized individuals to gain read and write access to controllers, raising critical security concerns for industrial environments. The vulnerability affects multiple product lines, including EcoStruxure Control Expert, Unity Pro, and various Modicon CPUs, emphasizing the need for prompt action to mitigate risks.
Affected Version(s)
EcoStruxure Control Expert (all prior to V15.0 SP1, including all of Unity Pro), EcoStruxure Control Expert V15.0 SP1, EcoStruxure Process Expert (all , including all of EcoStruxure Hybrid DCS), SCADAPack RemoteConnect for x70 (all ), Modicon M580 CPU (all - part numbers BMEP* and BMEH*), Modicon M340 CPU (all - part numbers BMXP34*) EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Control Expert V15.0 SP1, EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), SCADAPack RemoteConnect for x70 (all versions), Modicon M580 CPU (all versions - part numbers BMEP* and BMEH*), Modicon M340 CPU (all versions - part numbers BMXP34*)
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved