cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-25620,https://securityvulnerability.io/vulnerability/CVE-2023-25620,Improper Condition Check Vulnerability in Schneider Electric Controllers,"A security vulnerability exists in Schneider Electric Controllers that may lead to a denial of service if a malicious project file is uploaded by an authenticated user. This improper handling of unusual conditions, classified under CWE-754, exposes the controller to potential disruptions in operation. Users must ensure their systems are updated and secure against such vulnerabilities to maintain operational integrity and safety.",Schneider Electric,"Modicon M340 Cpu (part Numbers Bmxp34*),Modicon M580 Cpu (part Numbers Bmep* And Bmeh*),Modicon M580 Cpu Safety (part Numbers Bmep58*s And Bmeh58*s),Modicon Momentum Unity M1e Processor (171cbu*),Modicon Mc80 (bmkc80),Legacy Modicon Quantum (140cpu65*),Legacy Modicon Premium Cpus (tsxp57*)",6.5,MEDIUM,0.000590000010561198,false,,false,false,false,,,false,false,,2023-04-19T09:15:00.000Z,0 CVE-2023-25619,https://securityvulnerability.io/vulnerability/CVE-2023-25619,Denial of Service Vulnerability in Schneider Electric Modicon Controllers,"A vulnerability exists in Schneider Electric's Modicon controllers, where improper checks for unusual or exceptional conditions can lead to a denial of service when devices communicate using the Modbus TCP protocol. This could disrupt operations and requires immediate attention for proper remediation to ensure the integrity and availability of the affected controllers.",Schneider Electric,"Modicon M340 Cpu (part Numbers Bmxp34*),Modicon M580 Cpu (part Numbers Bmep* And Bmeh*),Modicon M580 Cpu Safety (part Numbers Bmep58*s And Bmeh58*s),Modicon Momentum Unity M1e Processor (171cbu*),Modicon Mc80 (bmkc80),Legacy Modicon Quantum (140cpu65*),Legacy Modicon Premium Cpus (tsxp57*)",7.5,HIGH,0.0006300000241026282,false,,false,false,false,,,false,false,,2023-04-19T08:15:00.000Z,0 CVE-2022-45788,https://securityvulnerability.io/vulnerability/CVE-2022-45788,Improper Condition Check in EcoStruxure Control Expert and Modicon Products,"A vulnerability exists within Schneider Electric's EcoStruxure Control Expert and various Modicon products due to improper checks for unusual or exceptional conditions. When a malicious project file is loaded onto the controller, it can lead to extensive security risks, including arbitrary code execution, potential denial of service, and a compromise of confidentiality and integrity. The scope of this vulnerability spans multiple versions of several products, indicating a widespread potential impact across Schneider Electric's portfolio.",Schneider Electric,"Ecostruxure Control Expert,Ecostruxure Process Expert,Modicon M340 Cpu (part Numbers Bmxp34*),Modicon M580 Cpu (part Numbers Bmep* And Bmeh*),Modicon M580 Cpu Safety (part Numbers Bmep58*s And Bmeh58*s),Modicon Momentum Unity M1e Processor (171cbu*),Modicon Mc80 (bmkc80),Legacy Modicon Quantum (140cpu65*) And Premium Cpus (tsxp57*)",7.5,HIGH,0.0018400000408291817,false,,false,false,false,,,false,false,,2023-01-30T00:00:00.000Z,0 CVE-2021-22792,https://securityvulnerability.io/vulnerability/CVE-2021-22792,NULL Pointer Dereference Vulnerability in Schneider Electric Modicon Series,"A vulnerability exists in various Schneider Electric Modicon PLC controllers and simulators that allows a specially crafted project file to cause a NULL Pointer Dereference. This can lead to a Denial of Service, affecting the operational capabilities of the affected devices. Users are advised to apply the latest security updates to mitigate potential risks. This vulnerability impacts a range of products, including the Modicon M580, M340, MC80, and others.",Schneider Electric,"Modicon M580 Cpu (part Numbers Bmep* And Bmeh*, All Versions), Modicon M340 Cpu (part Numbers Bmxp34*, All Versions), Modicon Mc80 (part Numbers Bmkc80*, All Versions), Modicon Momentum Ethernet Cpu (part Numbers 171cbu*, All Versions), Plc Simulator For Ecostruxureª Control Expert, Including All Unity Pro Versions (former Name Of Ecostruxureª Control Expert, All Versions), Plc Simulator For Ecostruxureª Process Expert Including All Hdcs Versions (former Name Of Ecostruxureª Process Expert, All Versions), Modicon Quantum Cpu (part Numbers 140cpu*, All Versions), Modicon Premium Cpu (part Numbers Tsxp5*, All Versions)",7.5,HIGH,0.0007099999929778278,false,,false,false,false,,,false,false,,2021-09-02T16:53:00.000Z,0 CVE-2021-22791,https://securityvulnerability.io/vulnerability/CVE-2021-22791,Out-of-bounds Write Vulnerability in Modicon PLC Controllers by Schneider Electric,"An out-of-bounds write vulnerability exists in various Modicon PLC controllers and simulators from Schneider Electric, which could be exploited when a specially crafted project file is used to update controller applications. This flaw may enable an attacker to cause a Denial of Service, potentially disrupting PLC operations and affecting system stability. It is critical for users of the affected products to ensure they are applying relevant updates and implementing security best practices to safeguard their systems.",Schneider Electric,"Modicon M580 Cpu (part Numbers Bmep* And Bmeh*, All Versions), Modicon M340 Cpu (part Numbers Bmxp34*, All Versions), Modicon Mc80 (part Numbers Bmkc80*, All Versions), Modicon Momentum Ethernet Cpu (part Numbers 171cbu*, All Versions), Plc Simulator For Ecostruxureª Control Expert, Including All Unity Pro Versions (former Name Of Ecostruxureª Control Expert, All Versions), Plc Simulator For Ecostruxureª Process Expert Including All Hdcs Versions (former Name Of Ecostruxureª Process Expert, All Versions), Modicon Quantum Cpu (part Numbers 140cpu*, All Versions), Modicon Premium Cpu (part Numbers Tsxp5*, All Versions)",6.5,MEDIUM,0.0006799999973736703,false,,false,false,false,,,false,false,,2021-09-02T16:52:51.000Z,0 CVE-2021-22790,https://securityvulnerability.io/vulnerability/CVE-2021-22790,Denial of Service Vulnerability in Schneider Electric Modicon Controllers,"A vulnerability exists within Schneider Electric's Modicon PLC controllers and simulators that allows for an out-of-bounds read, potentially triggering a Denial of Service condition. This issue can arise when a specially crafted project file is used to update the controller application, impacting various models including Modicon M580, M340, MC80, Momentum Ethernet CPU, as well as simulators associated with their EcoStruxure Control Expert and Process Expert platforms.",Schneider Electric,"Modicon M580 Cpu (part Numbers Bmep* And Bmeh*, All Versions), Modicon M340 Cpu (part Numbers Bmxp34*, All Versions), Modicon Mc80 (part Numbers Bmkc80*, All Versions), Modicon Momentum Ethernet Cpu (part Numbers 171cbu*, All Versions), Plc Simulator For Ecostruxureª Control Expert, Including All Unity Pro Versions (former Name Of Ecostruxureª Control Expert, All Versions), Plc Simulator For Ecostruxureª Process Expert Including All Hdcs Versions (former Name Of Ecostruxureª Process Expert, All Versions), Modicon Quantum Cpu (part Numbers 140cpu*, All Versions), Modicon Premium Cpu (part Numbers Tsxp5*, All Versions)",6.5,MEDIUM,0.0006799999973736703,false,,false,false,false,,,false,false,,2021-09-02T16:52:39.000Z,0 CVE-2021-22789,https://securityvulnerability.io/vulnerability/CVE-2021-22789,Buffer Overflow Vulnerability in Modicon PLC Controllers by Schneider Electric,"A vulnerability associated with improper memory boundary restrictions exists in various Modicon PLC controllers and simulators developed by Schneider Electric. This flaw can be exploited when a specially crafted project file is used to update the controller application, potentially leading to a Denial of Service condition. The affected products include multiple models of the Modicon PLC series as well as their associated simulators, affecting numerous deployment environments.",Schneider Electric,"Modicon M580 Cpu (part Numbers Bmep* And Bmeh*, All Versions), Modicon M340 Cpu (part Numbers Bmxp34*, All Versions), Modicon Mc80 (part Numbers Bmkc80*, All Versions), Modicon Momentum Ethernet Cpu (part Numbers 171cbu*, All Versions), Plc Simulator For Ecostruxureª Control Expert, Including All Unity Pro Versions (former Name Of Ecostruxureª Control Expert, All Versions), Plc Simulator For Ecostruxureª Process Expert Including All Hdcs Versions (former Name Of Ecostruxureª Process Expert, All Versions), Modicon Quantum Cpu (part Numbers 140cpu*, All Versions), Modicon Premium Cpu (part Numbers Tsxp5*, All Versions)",6.5,MEDIUM,0.0008099999977275729,false,,false,false,false,,,false,false,,2021-09-02T16:52:25.000Z,0 CVE-2020-7543,https://securityvulnerability.io/vulnerability/CVE-2020-7543,Denial of Service Vulnerability in Modicon Controllers by Schneider Electric,"A vulnerability exists within Modicon controllers produced by Schneider Electric that can lead to a denial of service condition. This occurs when a specially crafted Read Physical Memory request is sent over the Modbus protocol to the affected controllers. Such exploitation may disrupt the regular operations of the devices, posing a risk to the stability and security of the control system. It is critical for users of Modicon M580, M340, Quantum, and Premium controllers to update their systems and apply necessary mitigations as per the latest security advisories.",Schneider Electric,"Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see Security Notifications For Affected Versions)",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-12-11T00:52:21.000Z,0 CVE-2020-7542,https://securityvulnerability.io/vulnerability/CVE-2020-7542,Improper Condition Check Vulnerability in Modicon Controllers by Schneider Electric,"A vulnerability exists in Schneider Electric's Modicon controllers, including models M580, M340, Quantum, and Premium, due to inadequate checks for exceptional conditions. When an attacker sends a specially crafted Read Physical Memory request over the Modbus protocol, it may lead to a denial of service, disrupting operations and potentially impacting the availability of the affected controllers.",Schneider Electric,"Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see Security Notifications For Affected Versions)",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-12-11T00:52:14.000Z,0 CVE-2020-7537,https://securityvulnerability.io/vulnerability/CVE-2020-7537,Improper Check for Unusual Conditions in Modicon Controllers by Schneider Electric,"A vulnerability exists in certain Modicon Controllers from Schneider Electric, particularly affecting the Modicon M580, M340, Quantum, and Premium series. This issue is classified as improper checking for unusual or exceptional conditions. It allows an attacker to potentially cause a denial of service by sending a specially crafted Read Physical Memory request via Modbus to the controller. This vulnerability raises concerns about the stability and reliability of industrial control systems, necessitating prompt attention to security alerts and patches provided by Schneider Electric.",Schneider Electric,"Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see Security Notifications For Affected Versions)",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-12-11T00:51:52.000Z,0 CVE-2018-7794,https://securityvulnerability.io/vulnerability/CVE-2018-7794,Improper Condition Check in Modicon Products by Schneider Electric,"A vulnerability in Schneider Electric’s Modicon PLCs, including models M580, M340, Quantum, and Premium, arises from improper checks for unusual conditions when reading data via Modbus TCP. An attacker could exploit this issue by sending invalid index requests, potentially leading to a Denial of Service, disrupting operations and compromising system availability.",Schneider Electric,"Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see Security Notification For Specific Versions)",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-01-06T22:57:09.000Z,0 CVE-2019-6857,https://securityvulnerability.io/vulnerability/CVE-2019-6857,Improper Condition Check in Modicon Controllers by Schneider Electric,"A vulnerability exists in multiple Modicon controllers from Schneider Electric, where improper checks for unusual conditions can lead to Denial of Service. This issue arises specifically when certain memory blocks are accessed using the Modbus TCP protocol, potentially causing disruption in the controller's functionality. Affected models include Modicon M580, M340, Quantum, and Premium, as detailed in the related security notifications.",Schneider Electric,"Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see Security Notification For Specific Versions)",7.5,HIGH,0.0009500000160187483,false,,false,false,false,,,false,false,,2020-01-06T22:57:05.000Z,0 CVE-2019-6856,https://securityvulnerability.io/vulnerability/CVE-2019-6856,Improper Check Vulnerability in Modicon Products by Schneider Electric,"A vulnerability exists in Schneider Electric’s Modicon products, including the M580, M340, Quantum, and Premium series. This flaw is caused by an improper check for unusual or exceptional conditions related to Modbus TCP communication. Attackers could exploit this vulnerability by writing specific physical memory blocks, which might result in a Denial of Service, compromising the operation and reliability of the affected systems.",Schneider Electric,"Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see Security Notification For Specific Versions)",7.5,HIGH,0.0009500000160187483,false,,false,false,false,,,false,false,,2020-01-06T22:57:02.000Z,0 CVE-2019-6851,https://securityvulnerability.io/vulnerability/CVE-2019-6851,Information Disclosure Vulnerability in Schneider Electric's Modicon Controllers,"An information disclosure vulnerability exists in Schneider Electric's Modicon M580, M340, Premium, and Quantum controllers across all firmware versions. This issue arises when the TFTP protocol is utilized, allowing unauthorized access to sensitive data stored within the controller. This exposure may lead to the leakage of file and directory information, which poses a significant security risk for users relying on these industrial control systems.",Schneider Electric,"Modicon M580, Modicon M340, Modicon Premium , Modicon Quantum (all Firmware Versions)",7.5,HIGH,0.0016799999866634607,false,,false,false,false,,,false,false,,2019-10-29T14:55:35.000Z,0 CVE-2019-6845,https://securityvulnerability.io/vulnerability/CVE-2019-6845,Cleartext Transmission Vulnerability in Modicon Products by Schneider Electric,"A vulnerability exists in the Modicon series of products by Schneider Electric, specifically affecting the Modicon M580, Modicon M340, Modicon Premium, and Modicon Quantum across all firmware versions. This vulnerability arises from the cleartext transmission of sensitive information during application transfers via the Modbus TCP protocol. Organizations using these products should assess their configurations and consider implementing measures to secure data in transit to prevent potential information disclosure.",Schneider Electric,"Modicon M580, Modicon M340, Modicon Premium , Modicon Quantum (all Firmware Versions)",7.5,HIGH,0.0016799999866634607,false,,false,false,false,,,false,false,,2019-10-29T14:49:49.000Z,0 CVE-2019-6828,https://securityvulnerability.io/vulnerability/CVE-2019-6828,Uncaught Exception Vulnerability in Modicon Controllers by Schneider Electric,"The vulnerability presents an uncaught exception flaw in various Modicon controllers, potentially leading to a denial of service. Specifically, this issue can occur while accessing certain coils and registers through the Modbus protocol. Affected firmware versions prior to V2.90 for the M580 and V3.10 for the M340, along with all firmware versions for Modicon Premium and Quantum controllers, may expose systems to this risk, impacting the reliability and availability of industrial control systems.",Schneider Electric,"Modicon M580,Modicon M340,Modicon Premium,Modicon Quantum",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2019-09-17T19:59:33.000Z,0 CVE-2019-6809,https://securityvulnerability.io/vulnerability/CVE-2019-6809,"Uncaught Exception Vulnerability in Modicon M580, M340, Premium and Quantum by Schneider Electric","An uncaught exception vulnerability has been identified in Schneider Electric's Modicon series, which includes M580, M340, Premium, and Quantum products. This vulnerability arises when the controller attempts to process invalid data, potentially leading to interruptions in service. Affected firmware versions are prior to V2.90 for Modicon M580 and prior to V3.10 for Modicon M340. Users of the Modicon Premium and Quantum devices are also at risk as all versions are affected. Organizations using these products should assess their systems and implement appropriate mitigations to safeguard against this vulnerability.",Schneider Electric,"Modicon M580,Modicon M340,Modicon Premium,Modicon Quantum",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2019-09-17T19:50:29.000Z,0 CVE-2018-7844,https://securityvulnerability.io/vulnerability/CVE-2018-7844,Information Exposure in Schneider Electric Modicon Controllers,"A vulnerability affecting Schneider Electric's Modicon product line, including the M580, M340, Quantum, and Premium models, allows unauthorized access to sensitive SNMP information. This occurs when memory blocks are read from the controller via Modbus, potentially exposing sensitive data that could aid attackers in further compromising the system.",Schneider Electric,Modicon M580 Modicon M340 Modicon Quantum Modicon Premium,7.5,HIGH,0.006310000084340572,false,,false,false,true,2023-10-20T09:43:56.000Z,true,false,false,,2019-05-22T20:06:09.000Z,0 CVE-2019-6808,https://securityvulnerability.io/vulnerability/CVE-2019-6808,Improper Access Control in Modicon Controllers by Schneider Electric,"An improper access control vulnerability exists in all versions of Schneider Electric's Modicon M580, M340, Quantum, and Premium controllers. This flaw allows an attacker to remotely execute code by manipulating configuration settings via the Modbus protocol. Exploitation of this vulnerability could lead to significant disruptions in automation processes, unauthorized access, and potential physical damages. Organizations using these controllers should apply available updates and restrict access to prevent exploitation.",Schneider Electric,Modicon M580 Modicon M340 Modicon Quantum Modicon Premium,9.8,CRITICAL,0.014910000376403332,false,,false,false,false,,,false,false,,2019-05-22T20:05:50.000Z,0 CVE-2019-6807,https://securityvulnerability.io/vulnerability/CVE-2019-6807,Denial of Service Vulnerability in Modicon Controllers by Schneider Electric,"The vulnerability affects various Modicon controllers, enabling a risk of denial of service due to uncaught exceptions. When sensitive application variables are written to the controllers over Modbus, the affected devices may become unresponsive, impacting system reliability and performance. Organizations using these controllers should ensure their systems are patched and monitored to mitigate the risks associated with this vulnerability.",Schneider Electric,Modicon M580 Modicon M340 Modicon Quantum Modicon Premium,7.5,HIGH,0.0009200000204145908,false,,false,false,false,,,false,false,,2019-05-22T20:05:13.000Z,0 CVE-2019-6806,https://securityvulnerability.io/vulnerability/CVE-2019-6806,Information Exposure in Modicon Controllers by Schneider Electric,An information exposure vulnerability allows unauthorized access to sensitive SNMP data in Modicon controllers when reading variables via Modbus protocol. This could lead to the disclosure of critical information affecting system integrity and security.,Schneider Electric,Modicon M580 Modicon M340 Modicon Quantum Modicon Premium,7.5,HIGH,0.006310000084340572,false,,false,false,false,,,false,false,,2019-05-22T20:04:46.000Z,0 CVE-2018-7857,https://securityvulnerability.io/vulnerability/CVE-2018-7857,"Denial of Service Vulnerability in Modicon M580, M340, Quantum, and Premium Controllers by Schneider Electric","A vulnerability exists in the Modicon M580, M340, Quantum, and Premium controllers by Schneider Electric. This issue allows for Denial of Service conditions due to an uncaught exception when writing out of bounds variables to the controller via Modbus. If exploited, this can lead to unexpected behaviors, including potential interruption of service. Users are encouraged to apply available updates and follow best practices for securing their networks.",Schneider Electric,Modicon M580 Modicon M340 Modicon Quantum Modicon Premium,7.5,HIGH,0.001180000021122396,false,,false,false,false,,,false,false,,2019-05-22T20:04:10.000Z,0 CVE-2018-7856,https://securityvulnerability.io/vulnerability/CVE-2018-7856,Denial of Service in Modicon Controllers by Schneider Electric,"A vulnerability exists in the Modicon M580, M340, Quantum, and Premium controllers from Schneider Electric, which allows for a denial of service. This occurs when invalid memory blocks are written to the controller via Modbus, leading to potential disruptions in operations. Users are advised to assess their systems and apply the necessary mitigations to safeguard against this risk.",Schneider Electric,Modicon M580 Modicon M340 Modicon Quantum Modicon Premium,7.5,HIGH,0.001180000021122396,false,,false,false,false,,,false,false,,2019-05-22T20:03:45.000Z,0 CVE-2018-7855,https://securityvulnerability.io/vulnerability/CVE-2018-7855,Denial of Service Vulnerability in Modicon Controllers by Schneider Electric,"An uncaught exception vulnerability exists in all versions of Schneider Electric's Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium controllers. This vulnerability could allow an attacker to induce a Denial of Service condition by sending malformed breakpoint parameters to the device over the Modbus protocol. The lack of proper error handling may lead to interruptions in service, affecting the operational reliability of the affected controllers.",Schneider Electric,Modicon M580 Modicon M340 Modicon Quantum Modicon Premium,7.5,HIGH,0.0018100000452250242,false,,false,false,false,,,false,false,,2019-05-22T20:03:17.000Z,0 CVE-2018-7854,https://securityvulnerability.io/vulnerability/CVE-2018-7854,Denial of Service Vulnerability in Schneider Electric Modicon Controllers,"A vulnerability exists in all versions of Schneider Electric's Modicon controllers, including the M580, M340, Quantum, and Premium series. This vulnerability, categorized as a CWE-248 issue, can be exploited through the Modbus protocol by sending invalid debug parameters to the controller. Successful exploitation may lead to a denial of service condition, impacting the availability of the affected products.",Schneider Electric,Modicon M580 Modicon M340 Modicon Quantum Modicon Premium,7.5,HIGH,0.0013000000035390258,false,,false,false,true,2023-11-02T07:47:38.000Z,true,false,false,,2019-05-22T20:02:52.000Z,0