First published: Wed Apr 19 2023(Updated: )
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause denial of service of the controller when communicating over the Modbus TCP protocol.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric Modicon M580 Firmware | <4.10 | |
Schneider Electric Modicon M580 | ||
Schneider Electric Modicon M340 Firmware | <3.51 | |
Schneider Electric Modicon M340 | ||
Schneider Electric Modicon Momentum Unity M1E Processor Firmware | ||
Schneider Electric Modicon Momentum Unity M1E Processor | ||
Schneider Electric Modicon MC80 Firmware | ||
Schneider Electric Modicon MC80 Firmware | ||
Schneider Electric TSXP57 Firmware | ||
schneider-electric tsxp57 | ||
Schneider Electric BMEP58S | ||
Schneider Electric BMEP58S | ||
Schneider Electric BMEH58S Firmware | ||
Schneider Electric BMEH58S | ||
All of | ||
Schneider Electric Modicon M580 Firmware | <4.10 | |
Schneider Electric Modicon M580 | ||
All of | ||
Schneider Electric Modicon M340 Firmware | <3.51 | |
Schneider Electric Modicon M340 | ||
All of | ||
Schneider Electric Modicon Momentum Unity M1E Processor Firmware | ||
Schneider Electric Modicon Momentum Unity M1E Processor | ||
All of | ||
Schneider Electric Modicon MC80 Firmware | ||
Schneider Electric Modicon MC80 Firmware | ||
All of | ||
Schneider Electric TSXP57 Firmware | ||
schneider-electric tsxp57 | ||
All of | ||
Schneider Electric BMEP58S | ||
Schneider Electric BMEP58S | ||
All of | ||
Schneider Electric BMEH58S Firmware | ||
Schneider Electric BMEH58S |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25619 is a CWE-754 vulnerability that could cause denial of service of the controller when communicating over the Modbus TCP protocol.
Schneider-electric Modicon M580 Firmware versions up to 4.10 and Schneider-electric Modicon M340 Firmware versions up to 3.51 are affected.
CVE-2023-25619 has a severity rating of 7.5 (High).
To fix CVE-2023-25619, it is recommended to apply the patches or firmware updates provided by Schneider-electric.
More information about CVE-2023-25619 can be found in the security and safety notice document provided by Schneider-electric at: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-05.pdf