Welcome to the Schneider Electric corporate Website

Important message to Schneider Electric mobile application users

Recommended cybersecurity best practices

Stay informed about the latest security notifications

2025/04/08 ConneXium Network Manager CVE-2025-2222
CVE-2025-2223
CWE-20: Improper Input Validation
CWE-552: Files or Directories Accessible to External Parties
ConneXium Network Manager

See Security Notification for specific product versions affected.
SEVD-2025-098-01 PDF SEVD-2025-098-01 CSAF
2025/04/08 ​​Trio™ Q Licensed Data Radios​ CVE-2025-2440
CVE-2025-2441
CVE-2025-2442
CWE-922: Insecure Storage of Sensitive Information
CWE-1188: Incorrect Initialization of Resource
Trio™ Q Licensed Data Radio (Versions prior to v2.7.2) SEVD-2025-098-02 PDF SEVD-2025-098-02 CSAF
2025/04/08 ​​Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC​ CVE-2024-11425 CWE-131: Incorrect Calculation of Buffer Size Modicon M580 CPU (part numbers BMEP* and BMEH*, excluding M580 CPU Safety)
Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S) BMENOR2200H EVLink Pro AC

See Security Notification for specific product versions affected.
SEVD-2025-014-01 (V2.0) PDF SEVD-2025-014-01 (V2.0) CSAF
2025/04/08 ​​Wind River VxWorks DHCP Server Vulnerability Schneider Electric is aware of a vulnerability within the VxWorks Operating System from Wind River. Modicon M580 communication modules BMENOC
Modicon M580 communication modules BMECRA
Modicon M580/Quantum communication modules BMXCRA
Modicon Quantum communication modules 140CRA

See Security Notification for specific product versions affected.
SEVD-2025-014-03 (V2.0) PDF SEVD-2025-014-03 (V2.0) CSAF
2025/04/08 Modicon Controllers M340 / Momentum / MC80 CVE-2024-8936
CVE-2024-8937
CVE-2024-8938
CWE-20: Improper Input Validation
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-119: Improper Restriction of Operations
Modicon M340 CPU (part numbers BMXP34*)
Modicon MC80 (part numbers BMKC80) 
Modicon Momentum Unity M1E Processor (171CBU*)

See Security Notification for specific product versions affected.
SEVD-2024-317-03 (V2.0) PDF SEVD-2024-317-03 (V2.0) CSAF
2025/04/08 BadAlloc Vulnerabilities CVE-2020-28895
CVE-2020-35198
CVE-2021-22156
Schneider Electric is aware of multiple memory allocation vulnerabilities dubbed ‘BadAlloc’, disclosed by Microsoft on April 29, 2021. The impact of a successful exploitation of the vulnerabilities may result in denial of service, or remote code execution, depending on the context. See Security Notification for offer specific information. SEVD-2021-313-05 (V26.0) PDF SEVD-2021-313-05 (V26.0) CSAF
2025/03/11 ​​EcoStruxure™ Panel Server​ CVE-2025-2002 CWE-532: Insertion of Sensitive Information into Log Files EcoStruxure™ Panel Server (v2.0 and prior) SEVD-2025-070-01 PDF SEVD-2025-070-01 CSAF
2025/03/11 ​​EPAS-UI & EcoSUI​ CVE-2025-0813​ CWE-287: Improper Authentication EcoStruxure™ Power Automation System User Interface (EPAS-UI) - Secured Versions (v2.1 up to and including v2.9) SEVD-2025-070-02 PDF SEVD-2025-070-02 CSAF
2025/03/11 ​WebHMI Component For EcoStruxure™ Power Automation System User Interface and EcoStruxure™ Microgrid Operation Large CWE-1188: Initialization of a Resource with an Insecure Default  WebHMI – Deployed with EcoStruxure™ Power Automation System (WebHMI v4.1.0.0 and prior when deployed with EPAS User Interface 2.6.30.19 and prior) SEVD-2025-070-03 PDF SEVD-2025-070-03 CSAF
2025/03/11 Modicon Controllers M241 / M251Modicon Controllers M258 / LMC058 CVE-2024-11737 CWE-20: Improper Input Validation Modicon Controllers M241 / M251 (Versions prior to v5.2.11.29)
Modicon Controllers M258 / LMC058 (All versions)
SEVD-2024-345-03 (V2.0) PDF SEVD-2024-345-03 (V2.0) CSAF
2025/03/11 EcoStruxure™ Power Monitoring Expert (PME) CVE-2024-9005 CWE-502: Deserialization of Untrusted Data EcoStruxure™ Power Monitoring Expert (PME) (Version 2022 and prior) SEVD-2024-282-05 (V1.1) PDF SEVD-2024-282-05 (V1.1) CSAF
2025/02/11 ​​ASCO 5310 / 5350 Remote Annunciator​ CVE-2025-1058
CVE-2025-1059
CVE-2025-1060
CVE-2025-1070
CWE-319: Cleartext Transmission of Sensitive Information
CWE-434: Unrestricted Upload of File with Dangerous Type
CWE-494: Download of Code Without Integrity Check
CWE-770: Allocation of Resources Without Limits or Throttling
ASCO 5310 Single-Channel Remote Annunciator (All versions)
ASCO 5350 Eight Channel Remote Annunciator (All versions)
SEVD-2025-042-01 PDF SEVD-2025-042-01 CSAF
2025/02/11 ​​Uni-Telway driver used in EcoStruxure™ Control Expert​, EcoStruxure™ Process Expert, EcoStruxure™ Process Expert for AVEVA System Platform and OPC Factory Server​​ CVE-2024-10083 CWE-20: Improper Input Validation Uni-Telway driver 
Uni-Telway driver used in EcoStruxure™ Control Expert 
Uni-Telway driver used in EcoStruxure™ Process Expert 
Uni-Telway driver used in EcoStruxure™ Process Expert for AVEVA System Platform
Uni-Telway driver used in OPC Factory Server 

See Security Notification for specific product versions affected.
SEVD-2025-042-02 PDF SEVD-2025-042-02 CSAF
2025/02/11 ​EcoStruxure™ Process Expert, EcoStruxure™ Process Expert for AVEVA System Platform​ CVE-2025-0327 CWE-269: Improper Privilege Management EcoStruxure™ Process Expert (Versions 2020R2, 2021 & 2023 (prior to v4.8.0.5715))
EcoStruxure™ Process Expert for AVEVA System Platform (Versions 2020R2, 2021 & 2023)  
SEVD-2025-042-03 PDF SEVD-2025-042-03 CSAF
2025/02/11 Enerlin’X IFE and eIFE CVE-2025-0816
CVE-2025-0815
CVE-2025-0814
CWE-20: Improper Input Validation Enerlin’X IFE interface (LV434001) (All versions)
Enerlin’X eIFE (LV851001) (All versions)
SEVD-2025-042-04 PDF SEVD-2025-042-04 CSAF
2025/02/11 ​​FlexNet Publisher Vulnerability​ Schneider Electric is aware of a vulnerability disclosed on Revenera FlexNet Publisher component. EcoStruxure™ Process Expert 
EcoStruxure™ OPC UA Server Expert
EcoStruxure™ Control Expert Asset Link 
EcoStruxure™ Machine SCADA Expert Asset Link 
EcoStruxure™ Architecture Builder 
EcoStruxure™ Operator Terminal Expert 
EcoStruxure™ Machine Expert including EcoStruxure™ Machine Expert Safety 
EcoStruxure™ Machine Expert Twin 
EcoStruxure™ Process Expert for AVEVA System Platform
Vijeo Designer 
Zelio Soft 2 

See Security Notification for specific product versions affected.
SEVD-2025-014-07 (V2.0) PDF SEVD-2025-014-07 (V2.0) CSAF
2025/02/11 Modicon Controllers CVE-2018-7842
CVE-2018-7843
CVE-2018-7844
CVE-2018-7845
CVE-2018-7846
CVE-2018-7847
CVE-2018-7848
CVE-2018-7849
CVE-2018-7850
CVE-2018-7852
CVE-2018-7853
CVE-2018-7854
CVE-2018-7855
CVE-2018-7856
CVE-2018-7857
CVE-2019-6806
CVE-2019-6807
CVE-2019-6808
CVE-2019-6809
CVE-2019-6828
CVE-2019-6829
CVE-2019-6830
CWE-125: Out-of-bounds Read
CWE-200: Information Exposure
CWE-248: Uncaught Exception
CWE-284: Improper Access Control
CWE-290: Authentication Bypass by Spoofing
CWE-501: Trust Boundary Violation
CWE-807: Reliance on Untrusted Inputs in a Security Decision
Modicon M340
Modicon M580
Modicon MC80
Modicon Momentum Unity M1E Processor (part numbers 171CBU*)
Modicon Premium
Modicon Quantum
PLC Simulator for EcoStruxure™ Control Expert

See Security Notification for specific product versions affected.
SEVD-2019-134-11 (V12.0) PDF SEVD-2019-134-11 (V12.0) CSAF
2025/01/14 ​​Pro-face GP-Pro EX and Remote HMI​ CVE-2024-12399​ CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel Pro-face GP-Pro EX (All versions)
Pro-face Remote HMI (All versions)
SEVD-2025-014-02 PDF SEVD-2025-014-02 CSAF
2025/01/14 ​​Web Designer for Modicon Communication Modules​ CVE-2024-12476 CWE-611: Improper Restriction of XML External Entity Reference Web Designer for BMXNOR0200H 
Web Designer for BMXNOE0110(H) 
Web Designer for BMENOC0311(C)
Web Designer for BMENOC0321(C)

See Security Notification for specific product versions affected.
SEVD-2025-014-04 PDF SEVD-2025-014-04 CSAF
2025/01/14 ​​Web Server on Modicon M340 and  BMXNOE0100/0110, BMXNOR0200H Communication Modules​  CVE-2024-12142 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor Modicon M340 processors (part numbers BMXP34*) 
BMXNOE0100
BMXNOE0110 
BMXNOR0200H 

See Security Notification for specific product versions affected.
SEVD-2025-014-05 PDF SEVD-2025-014-05 CSAF
2025/01/14 ​​RemoteConnect and SCADAPack™ x70 Utilities​ CVE-2024-12703 CWE-502: Deserialization of untrusted data RemoteConnect and SCADAPack™ x70 Utilities (All versions) SEVD-2025-014-06 PDF SEVD-2025-014-06 CSAF
2025/01/14 ​​PowerLogic™ HDPM6000 High-Density Metering System​ CVE-2024-10497
CVE-2024-10498
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-639: Authorization Bypass Through User-Controlled Key
​​PowerLogic™ HDPM6000 Version v0.62.7 only (CVE-2024-10497)
PowerLogic™ HDPM6000 Versions v0.62.7 and prior (CVE-2024-10498)
SEVD-2025-014-08 PDF SEVD-2025-014-08 CSAF
2025/01/14 ​​EcoStruxure™ Power Build Rapsody​ ​CVE-2024-11139 CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer EcoStruxure™ Power Build Rapsody  

See Security Notification for specific product versions affected.
SEVD-2025-014-09 PDF SEVD-2025-014-09 CSAF
2024/12/10 ​​PowerChute Serial Shutdown​ CVE-2024-10511 CWE-287: Improper Authentication PowerChute Serial Shutdown (Versions v1.2.0.301 and prior) SEVD-2024-345-01 PDF SEVD-2024-345-01 CSAF
2024/12/10 ​​Harmony HMI and Pro-face HMI products​ CVE-2024-11999 CWE-1104: Use of Unmaintained Third-Party Components Harmony (Formerly Magelis) HMIST6, HMISTM6, HMIG3U, HMIG3X, HMISTO7 series with EcoStruxure™ Operator Terminal Expert runtime (All versions)
PFXST6000, PFXSTM6000, PFXSP5000, PFXGP4100 series with Pro-face BLUE runtime (All versions)


See Security Notification for specific product versions affected.
SEVD-2024-345-02 PDF SEVD-2024-345-02 CSAF
2024/11/12 ​​PowerLogic PM5300 Series​ CVE-2024-9409 CWE-400: An Uncontrolled Resource Consumption PowerLogic PM5320
PowerLogic PM5340 
PowerLogic PM5341 

See Security Notification for specific product versions affected.
SEVD-2024-317-01 PDF SEVD-2024-317-01 CSAF
2024/11/12 ​​Modicon Controllers M340 / Momentum / MC80​ CVE-2024-8933
CVE-2024-8935
CWE-290: Authentication Bypass by Spoofing
CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel
Modicon M340 CPU (part numbers BMXP34*)
Modicon MC80 (part numbers BMKC80) 
Modicon Momentum Unity M1E Processor (171CBU*)

See Security Notification for specific product versions affected.
SEVD-2024-317-02 PDF SEVD-2024-317-02 CSAF
2024/11/12 ​EcoStruxure™ IT Gateway CVE-2024-10575 CWE-862: Missing Authorization EcoStruxure™ IT Gateway (Versions 1.21.0.6, 1.22.0.3, 1.22.1.5, 1.23.0.4) SEVD-2024-317-04 PDF SEVD-2024-317-04 CSAF
2024/11/12 PowerLogic PM55xx and PowerLogic PM8ECC CVE-2021-22763
CVE-2021-22764
CWE-640: Weak Password Recovery Mechanism for Forgotten Password
CWE-287: Improper Authentication
PM5560
PM5561
PM5562
PM5563
PM8ECC 

See Security Notification for specific product versions affected.
SEVD-2021-159-02 (V2.0) PDF SEVD-2021-159-02 (V2.0) CSAF
2024/10/08 ​​Data Center Expert​ CVE-2024-8531
CVE-2024-8530
CWE-347: Improper Verification of Cryptographic Signature
CWE-306: Missing Authentication for Critical Function 
Data Center Expert (Versions 8.1.1.3 and prior) SEVD-2024-282-01 PDF SEVD-2024-282-01 CSAF
2024/10/08 ​​Harmony iPC – HMIBSC IIoT Edge Box Core​ The third-party Yocto OS (v2.1 Krogoth) is used in the HMIBSC offer. It is known to contain multiple high and critical risk vulnerabilities. Schneider Electric cannot update the OS on the HMIBSC due to its hardware limitations and cannot provide further security updates to our customers. Harmony iPC – HMIBSC IIoT Edge Box Core
HMIBSCEA53D1L0T 
HMIBSCEA53D1L0A  
HMIBSCEA53D1L01
HMIBSCEA53D1LSE 
HMIBSCEA53D1LSU

See Security Notification for specific product versions affected.
SEVD-2024-282-02 PDF SEVD-2024-282-02 CSAF
2024/10/08 ​​Easergy Studio​ CVE-2024-9002 CWE-269: Improper Privilege Management Easergy Studio (Versions 9.3.1 and prior) SEVD-2024-282-03 PDF SEVD-2024-282-03 CSAF
2024/10/08 ​EVlink Home Smart and Schneider Charge​ CVE-2024-8070 CWE-312: Cleartext Storage of Sensitive Information EVlink Home Smart (All versions prior to 2.0.6.0.0)
Schneider Charge (All versions prior to 1.13.4)
SEVD-2024-282-04 PDF SEVD-2024-282-04 CSAF
2024/10/08 ​​Zelio Soft 2​ CVE-2024-8422
CVE-2024-8518
CWE-416: Use After Free
CWE-20: Improper Input Validation
​​Zelio Soft 2​ (Versions prior to 5.4.2.2) SEVD-2024-282-06 PDF SEVD-2024-282-06 CSAF
2024/10/08 System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs CVE-2024-8884 CWE-200: Information Exposure System Monitor application in Harmony Industrial PC HMIBMO/HMIBMI/HMIPSO/HMIBMP/HMIBMU/HMIPSP/HMIPEP series (All versions)
System Monitor application in Pro-face Industrial PC PS5000 series  (All versions)
SEVD-2024-282-07 PDF SEVD-2024-282-07 CSAF
2024/10/08 EcoStruxure EV Charging Expert The third-party Yocto Krogoth 2.1 Operating System is used in the EcoStruxure EV Charging Expert product. It is known to contain multiple high and critical severity vulnerabilities. EcoStruxure EV Charging Expert (All versions prior to V6.0.0) SEVD-2024-282-08 PDF SEVD-2024-282-08 CSAF
2024/10/08 Modicon M340 Controller and Communication Modules CVE-2022-0222 CWE-269: Improper Privilege Management Modicon M340 CPUs (BMXP34* versions prior to v3.50)
Modicon M340 X80 Ethernet Communication modules (BMXNOE0100 (H) versions prior to SV03.50 BMXNOE0110 (H) versions prior to SV06.70 BMXNOR* versions prior to v1.7 IR24)
SEVD-2022-102-02 (V3.1) PDF SEVD-2022-102-02 (V3.1) CSAF
2024/09/10 ​​Vijeo Designer ​ CVE-2024-6918 CWE-269: Improper Privilege Management  Vijeo Designer (Versions prior to V6.3 SP1 ) 
Vijeo Designer embedded in EcoStruxure™ Machine Expert  (All versions)
SEVD-2024-254-01 PDF SEVD-2024-254-01 CSAF
2024/09/10 ​​EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards​ CVE-2024-8401 CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) EcoStruxure™ Power Monitoring Expert (PME) 2021
EcoStruxure™ Power Monitoring Expert (PME) 2020
EcoStruxure™ Power Operation (EPO) 2022
EcoStruxure™ Power Operation (EPO) 2022 – Advanced Reporting and Dashboards Module
EcoStruxure™ Power Operation (EPO) 2021
EcoStruxure™ Power Operation (EPO) 2021 – Advanced Reporting and Dashboards Modul
EcoStruxure™ Power SCADA Operation 2020 (PSO) - Advanced Reporting and Dashboards Module 

See Security Notification for specific product versions affected.
SEVD-2024-254-02 PDF SEVD-2024-254-02 CSAF
2024/09/10 PowerLogic P5 CVE-2024-5559 CWE-327: Use of a Broken or Risky Cryptographic Algorithm PowerLogic P5 (v01.500.104 and prior) SEVD-2024-163-02 (V1.2) PDF SEVD-2024-163-02 (V1.2) CSAF
2024/09/10 EcoStruxure™ Power Monitoring Expert CVE-2023-28003 CWE-613: Insufficient Session Expiration EcoStruxure™ Power Monitoring Expert 2022
EcoStruxure™ Power Operation (EPO)

See Security Notification for specific product versions affected.
SEVD-2023-073-01 (V3.0) PDF SEVD-2023-073-01 (V3.0) CSAF
2024/08/13 Accutech Manager CVE-2024-6918 CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Accutech Manager (Versions 2.8.0.0 and prior) SEVD-2024-226-01 PDF SEVD-2024-226-01 CSAF
2024/08/13 Modicon Controllers M241 M251 M262 CVE-2024-6528 CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ​​Modicon Controllers M241 / M251 ​ 
Modicon Controllers M258 / LMC058
Modicon Controllers M262​ 

See Security Notification for specific product versions affected.
SEVD-2024-191-04 (V2.0) PDF SEVD-2024-191-04 (V2.0) CSAF
2024/08/13 Modicon Controllers ​CVE-2019-6841
CVE-2019-6842​ 
CVE-2019-6843
CVE-2019-6844​ 
CVE-2019-6846​
CVE-2019-6847​
CWE-755: Improper Handling of Exceptional Conditions​ ​
CWE-319: Cleartext Transmission of Sensitive Information
Modicon M580 (part numbers BMEP* & BMEH*, excluding M580 CPU Safety)
Modicon M580 CPU Safety (part numbers BMEP58*S & BMEH58*S)
Modicon M340 
Modicon BMxCRA and 140CRA modules

See Security Notification for specific product versions affected.
SEVD-2019-281-02 (V7.0) PDF SEVD-2019-281-02 (V7.0) CSAF
2024/08/13 ​​EcoStruxure™ Machine SCADA Expert / BLUE Open Studio​ Schneider Electric is aware of a vulnerability disclosed on AVEVA component used in ​EcoStruxure™ Machine SCADA Expert and BLUE Open Studio​ products. EcoStruxure™ Machine SCADA Expert (Version prior to 2020 SP3 HF1) 
Pro-face BLUE Open Studio (Version prior to 2020 SP3 HF1)
SEVD-2024-226-02 PDF SEVD-2024-226-02 CSAF
2024/08/13 ​​​EcoStruxure™ Control Expert, EcoStruxure™ Process Expert ​and Modicon M340, M580 and M580 Safety PLCs​​​ CVE-2023-6408
CVE-2023-6409
CVE-2023-27975
CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel
CWE-798: Use of Hard-coded Credentials
CWE-522: Insufficiently Protected Credentials
Modicon M340 CPU (part numbers BMXP34*)
Modicon M580 CPU (part numbers BMEP* and BMEH*, excluding M580 CPU Safety)
Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)
Modicon MC80 (part numbers BMKC80)
Modicon Momentum Unity M1E Processor (171CBU*)
EcoStruxure™ Control Expert
EcoStruxure™ Process Expert

See Security Notification for specific product versions affected.
SEVD-2024-044-01 (V2.0) PDF SEVD-2024-044-01 (V2.0) CSAF
2024/08/13 ​​EcoStruxure™ OPC UA Server Expert, Modicon Communication Server​ CVE-2023-37200 CWE-611: Improper Restriction of XML External Entity Reference EcoStruxure™ OPC UA Server Expert (Versions prior to SV2.01 SP2) SEVD-2023-192-02 (V2.0) PDF SEVD-2023-192-02 (V2.0) CSAF
2024/08/13 Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) CVE-2023-25619
CVE-2023-25620
CWE-754: Improper Check for Unusual or Exceptional Conditions Modicon M340 CPU (part numbers BMXP34*)
Modicon M580 CPU (part numbers BMEP* and BMEH*)
Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)
Modicon Momentum Unity M1E Processor (171CBU*)
Modicon MC80 (BMKC80)
Legacy Modicon Quantum (140CPU65*)
Legacy Modicon Premium CPUs (TSXP57*)

See Security Notification for specific product versions affected.
SEVD-2023-101-05 (V4.0) PDF SEVD-2023-101-05 (V4.0) CSAF
2024/08/13 EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety CVE-2022-45789 CWE-294: Authentication Bypass by Capture-replay vulnerability. EcoStruxure™ Control Expert
EcoStruxure™ Process Expert
Modicon M340 CPU (part numbers BMXP34*)
Modicon M580 CPU (part numbers BMEP* and BMEH*)
Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)
Modicon Momentum Unity M1E Processor (171CBU*)
Modicon MC80 (BMKC80)

See Security Notification for specific product versions affected.
SEVD-2023-010-06 (V5.0) PDF SEVD-2023-010-06 (V5.0) CSAF
2024/08/13 EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) CVE-2022-45788 CWE-754: Improper Check for Unusual or Exceptional Conditions Modicon Controllers M241 / M251
Modicon Controllers M258 / LMC058
Modicon Controllers M262

See Security Notification for specific product versions affected.
SEVD-2023-010-05 (V6.0) PDF SEVD-2023-010-05 (V6.0) CSAF
2024/08/13 Modicon PAC Controllers CVE-2021-22786 CWE-200: Information Exposure Modicon M340 CPU (part numbers BMXP34*)
Modicon M580 CPU (part numbers BMEP* and BMEH*)
Modicon MC80 (BMKC80)
Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)
Modicon Momentum MDI (171CBU*)
Legacy Modicon Quantum

See Security Notification for specific product versions affected.
SEVD-2022-221-04 (V5.0) PDF SEVD-2022-221-04 (V5.0)
2024/08/13 Modicon PAC Controllers CVE-2022-37301 CWE-191: Integer Underflow (Wrap or Wraparound) Modicon M340 CPU (part numbers BMXP34*)
Modicon M580 CPU (part numbers BMEP* and BMEH*)
Modicon M580 CPU Safety (part numbers BMEP584040S and BMEP586040S)
Legacy Modicon Quantum/Premium
Modicon Momentum MDI (171CBU*)

See Security Notification for specific product versions affected.
SEVD-2022-221-02 (V5.0) PDF SEVD-2022-221-02 (V5.0) CSAF
2024/08/13 EcoStruxure™ Control Expert, EcoStruxure™ Process Expert, and Modicon Controllers M580 and M340 CVE-2022-37300 CWE-640: Weak Password Recovery Mechanism for Forgotten Password EcoStruxure™ Control Expert Including all Unity Pro versions (former name of EcoStruxure™ Control Expert)
EcoStruxure™ Process Expert, Including all versions of EcoStruxure™ Hybrid DCS (former name of EcoStruxure™ Process Expert)
Modicon M340 CPU
Modicon M580 CPU
Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)

See Security Notification for specific product versions affected.
SEVD-2022-221-01 (V5.0) PDF SEVD-2022-221-01 (V5.0) CSAF
2024/08/13 Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert CVE-2021-22789
CVE-2021-22790
CVE-2021-22791
CVE-2021-22792
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-125: Out-of-Bounds Read
CWE-476: NULL Pointer Dereference
CWE-787: Out-of-Bounds Write
Modicon M580 CPU (part numbers BMEP* and BMEH*)
Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)
Modicon M340 CPU (part numbers BMXP34*)
Modicon MC80 (part numbers BMKC80*)
Modicon Momentum Ethernet CPU (part numbers 171CBU*)
PLC Simulator for EcoStruxure™ Control Expert, including all Unity Pro versions
PLC Simulator for EcoStruxure™ Process Expert including all HDCS versions
Modicon Quantum CPU (part numbers 140CPU*) br/>Modicon Premium CPU (part numbers TSXP5*)

See Security Notification for specific product versions affected.
SEVD-2021-222-04 (V7.0) PDF SEVD-2021-222-04 (V7.0) CSAF
2024/08/13 EcoStruxure™ Control Expert, EcoStruxure™ Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 CVE-2021-22778
CVE-2021-22779
CVE-2021-22780
CVE-2021-22781
CVE-2021-22782
CVE-2020-12525
CWE-311: Missing Encryption of Sensitive Data
CWE-522: Insufficiently Protected Credentials
EcoStruxure™ Control Expert
EcoStruxure™ Process Expert
SCADAPack RemoteConnect™ for x70
Modicon M580 CPU (part numbers BMEP* and BMEH*)
Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)
Modicon M340 CPU (part numbers BMXP34*)

See Security Notification for specific product versions affected.
SEVD-2021-194-01 (V9.0) PDF SEVD-2021-194-01 (V9.0) CSAF
2024/08/13 Embedded FTP Servers for Modicon PAC Controllers CVE-2018-7240
CVE-2018-7241
CVE-2018-7242
​CWE-327: Use of a Broken or Risky Cryptographic Algorithm ​
CWE-522: Insufficiently Protected Credentials
​CWE-798: Use of Hard-coded Credentials
Modicon M340
Modicon M580
Modicon M580 CPU Safety Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)
Modicon BMxCRA and 140CRA modules

See Security Notification for specific product versions affected.
SEVD-2018-081-01 (V9.0) PDF SEVD-2018-081-01 (V9.0)
2024/07/09 ​​Wiser Home Controller WHC-5918A​ ​CVE-2024-6407​ CWE-200: Information Exposure  Wiser Home Controller WHC-5918A SEVD-2024-191-01 PDF SEVD-2024-191-01 CSAF
2024/07/09 ​​​EcoStruxure™ Foxboro DCS Core Control Services​​ CVE-2024-5679​
​​CVE-2024-5680
CVE-2024-5681
CWE-20: Improper Input Validation
CWE-129: Improper Validation of Array Index 
CWE-787: Out-of-Bounds Write 
EcoStruxure™ Foxboro DCS Core Control Services (Versions 9.8 and prior) SEVD-2024-191-02 PDF SEVD-2024-191-02 CSAF
2024/07/09 ​​EcoStruxure™ Foxboro SCADA FoxRTU Station​ CVE-2024-2602 CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') FoxRTU Station (All versions prior to v9.3.0) SEVD-2024-191-03 PDF SEVD-2024-191-03 CSAF
2024/07/09 Sage RTU CVE-2024-5560
CVE-2024-37036
CVE-2024-37037
CVE-2024-37038
CVE-2024-37039
CVE-2024-37040
CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) 
CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE-125: Out-of-bounds Read
CWE-252: Unchecked Return Value CWE-276: Incorrect Default Permissions
CWE-787: Out-of-bounds Write
Sage 1410 (Versions C3414-500-S02K5_P8 and prior) 
Sage 1430 (Versions C3414-500-S02K5_P8 and prior)
Sage 1450 (Versions C3414-500-S02K5_P8 and prior) 
Sage 2400 (Versions C3414-500-S02K5_P8 and prior)
Sage 3030 Magnum (Versions C3414-500-S02K5_P8 and prior)
Sage 4400 (Versions C3414-500-S02K5_P8 and prior)
SEVD-2024-163-05 (V2.0) PDF SEVD-2024-163-05 (V2.0) CSAF
2024/06/11 Modicon M340 and BMXNOE0100 and BMXNOE0110 CVE-2024-5056 CWE-552: Files or Directories Accessible to External Parties Modicon M340 (All Versions)
Network module, Modicon M340, Modbus/TCP BMXNOE0100 (All Versions)
Network module, Modicon M340, Ethernet TCP/IP BMXNOE0110 (All Versions)
SEVD-2024-163-01 PDF SEVD-2024-163-01 CSAF
2024/06/11 EVlink Home Smart CVE-2024-5313 CWE-668: Exposure of the Resource Wrong Sphere EVlink Home Smart (v2.0.4.1.2_131, v2.0.3.8.2_128) SEVD-2024-163-03 PDF SEVD-2024-163-03 CSAF
2024/06/11 ​​SpaceLogic AS-P​ and AS-B Automation Servers CVE-2024-5558
CVE-2024-5557 
CVE-2024-5558
CVE-2024-5557
SpaceLogic AS-P (v5.0.3 and prior)
SpaceLogic AS-B (v5.0.3 and prior)
SEVD-2024-163-04 PDF SEVD-2024-163-04 CSAF
2024/06/11 CODESYS Runtime Vulnerabilities Schneider Electric is aware of ​multiple vulnerabilities​ disclosed on ​CODESYS runtime system V3 communication server​. Easy Harmony HMIET6/HMIFT6
Easy Modicon M310
HMISCU Controller
Harmony (Formerly Magelis) HMIGK/HMIGTO/HMIGTU/HMIGTUX/HMISTU series, iPC series with Vijeo Designer runtime
Magelis HMIGXU, XBT series
Modicon Controller LMC058
Modicon Controller LMC078
Modicon Controller M218
Modicon Controller M241
Modicon Controller M251
Modicon Controller M258
Modicon Controller M262
PacDrive 3 Controllers: LMC Eco/Pro/Pro2
SoftSPS embedded in EcoStruxure™ Machine Expert
Vijeo Designer embedded in EcoStruxure™ Machine Expert

See Security Notification for specific product versions affected.
SEVD-2023-192-04 (V6.0) PDF SEVD-2023-192-04 (V6.0) CSAF
2024/06/11 Easy UPS Online Monitoring Software CVE-2023-29411
CVE-2023-29412
CVE-2023-29413
CWE-306: Missing Authentication for Critical Function
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-306: Missing Authentication for Critical Function
APC Easy UPS Online Monitoring Software (v2.5-GA-01-22320 and prior (Windows 10, 11 Windows Server 2016, 2019, 2022))
Schneider Electric Easy UPS Online Monitoring Software* (v2.5-GS-01-22320 and prior (Windows 10, 11 Windows Server 2016, 2019, 2022))
*Known as Schneider SP Series UPS Monitoring Software in China.
SEVD-2023-101-04 (V4.0) PDF SEVD-2023-101-04 (V4.0) CSAF
2024/04/09 ​Easergy Studio​ CVE-2024-2747 CWE-428: Unquoted search path or element vulnerability Easergy Studio (Easergy Studio v9.3.3 and prior) SEVD-2024-​100-01 PDF SEVD-2024-​100-01 CSAF
2024/04/09 Trio™ Licensed and License-free Data Radios CVE-2023-5629​
CVE-2023-5630
CWE-601: URL Redirection to Untrusted Site (‘Open Redirect’) vulnerability
CWE-494: Download of Code Without Integrity Check vulnerability
Trio Q-Series Ethernet Data Radio
Trio E-Series Ethernet Data Radio
Trio J-Series Ethernet Data Radio

See Security Notification for specific product versions affected.
SEVD-2023-346-01 (V2.0) PDF SEVD-2023-346-01 (V2.0) CSAF
2024/04/06 Galaxy VS and Galaxy VL​ CVE-2023-6032​ CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability Galaxy VS (v12.21)
Galaxy VL (v6.82)
SEVD-2023-318-03 (V2.0) PDF SEVD-2023-318-03 (V2.0) CSAF
2024/03/12 ISaGRAF Vulnerabilities in IEC 61131-3 Programming and Engineering Tools CVE-2020-25176
CVE-2020-25178
CVE-2020-25182
CVE-2020-25184
CVE-2020-25180
Schneider Electric is aware of multiple vulnerabilities in ISaGRAF Workbench and ISaGRAF Runtime products. Easergy T300
Easergy C5
MiCOM C264
PACiS GTW
EPAS GTW
SCADAPack 300E RTU
SCADAPack 53xE RTU
SCADAPack Workbench
SCD2200 Firmware for CP-3/MC-31
SAGE RTU (C3414 CPU, C3413 CPU, C3412 CPU)
Talus T4e Mk 1 (A18.xx Firmware (all)) T4e Mk II and T4c (A19.08 Firmware and prior)

See Security Notification for specific product versions affected.
SEVD-2021-159-04 (V7.0) PDF SEVD-2021-159-04 (V7.0) CSAF
2024/03/12 ​Easergy T200 CVE-2024-2050
CVE-2024-2051
CVE-2024-2052
CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE-307: Improper Restriction of Excessive Authentication Attempts
CWE-552: Files or Directories Accessible to External Parties 
Easergy T200 Models: T200I, T200E, T200P, T200S, T200H (Modbus) (Version SC2-04MOD-07000104 and prior)
Easergy T200 Models: T200I, T200E, T200P, T200S, T200H (IEC104) (Version SC2-04IEC-07000104 and prior)
Easergy T200 Models: T200I, T200E, T200P, T200S, T200H (DNP3) (Version SC2-04DNP-07000104 and prior)
SEVD-2024-072-01 PDF SEVD-2024-072-01 CSAF
2024/03/12 EcoStruxure Power Design - Ecodial CVE-2024-2229 CWE-502: Deserialization of Untrusted Data EcoStruxure Power Design - Ecodial (Ecodial NL All Versions, Ecodial INT All Versions, Ecodial FR All Versions) SEVD-2024-072-02 PDF SEVD-2024-072-02 CSAF
2024/02/13 ​​EcoStruxure™ Control Expert, EcoStruxure™ Process Expert ​and Modicon M340, M580 and M580 Safety PLCs CVE-2023-6408
CVE-2023-6409
CVE-2023-27975
CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel
CWE-798: Use of Hard-coded Credentials
CWE-522: Insufficiently Protected Credentials
Modicon M340 CPU (part numbers BMXP34*)
Modicon M580 CPU (part numbers BMEP* and BMEH*, excluding M580 CPU Safety)
Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)
EcoStruxure™ Control Expert
EcoStruxure™ Process Expert

See Security Notification for specific product versions affected.
SEVD-2024-044-01 PDF SEVD-2024-044-01 CSAF
2024/02/13 ​​Harmony Relay NFC​ ​CVE-2024-0568​ CWE-287: Improper Authentication Harmony Control Relay RMNF22TB30 (All versions)
Harmony Timer Relay RENF22R2MMW (All versions)
SEVD-2024-044-02 PDF SEVD-2024-044-02 CSAF
2024/02/13 ​​EcoStruxure IT Gateway​ CVE-2024-0865 CWE-798: Use of hard-coded credentials EcoStruxure IT Gateway (1.20.x and prior) SEVD-2024-044-03 PDF SEVD-2024-044-03 CSAF
2024/02/01 Sustainability Business Division of Schneider Electric Responds to Cybersecurity Incident N/A On January 17th, 2024, a ransomware incident affected Schneider Electric Sustainability Business division. N/A Cybersecurity Incident Announcement
2024/01/09 ​​Easergy Studio​ CVE-2023-7032 CWE-502: Deserialization of untrusted data Easergy Studio (Versions prior to v9.3.50) SEVD-2024-009-02 PDF SEVD-2024-009-02 CSAF
2024/01/09 EcoStruxure™ Control Expert CVE-2023-1548
CVE-2023-27976
CWE-668: Exposure of Resource to Wrong Sphere
CWE-269: Improper Privilege Management
EcoStruxure™ Control Expert (Versions prior to V16.0) SEVD-2023-101-03 (V2.0) PDF SEVD-2023-101-03 (V2.0) CSAF
2024/01/09 CODESYS Runtime Vulnerabilities CVE-2022-4224
CVE-2023-28355
CVE-2022-4046
CWE-668: Exposure of Resource to Wrong Sphere HMISCU Controller
Modicon Controller M241
Modicon Controller M251
Modicon Controller M262
Modicon Controller M258
Modicon Controller LMC058
Modicon Controller M218
PacDrive 3 Controllers: LMC Eco/Pro/Pro2
PacDrive Controller LMC078

See Security Notification for specific product versions affected.
SEVD-2023-101-01 (V2.0) PDF SEVD-2023-101-01 (V2.0) CSAF
2024/01/09 Harmony (formerly known as Magelis) HMI Panels CVE-2019-6833 CWE-754 – Improper Check for Unusual or Exceptional Conditions Harmony/Magelis HMIGK series
Harmony/Magelis HMIGTO series
Harmony/Magelis HMISTO series (End of Commercialization)
Harmony/Magelis) HMIGTU series
Harmony/Magelis HMIGTUX series
Harmony/Magelis HMIGXO series (End of Commercialization)
Harmony/Magelis HMIGXU series
Harmony/Magelis HMISCU series
Harmony/Magelis HMISTU series
Harmony/Magelis XBTGC series
Harmony/Magelis XBTGH series
Harmony/Magelis XBTGT series (End of Commercialization)

See Security Notification for specific product versions affected.
SEVD-2019-225-01 (V3.0) PDF SEVD-2019-225-01 (V3.0) CSAF
2023/12/12 ProLeiT Plant iT/Brewmaxx​ Schneider Electric is aware of ​a vulnerability​ in Redis open-source database, affecting its ​Plant iT​ product. Plant iT/Brewmaxx (v9.60 and above) SEVD-2023-346-02 PDF SEVD-2023-346-02 CSAF
2023/12/12 ​​Easy UPS Online Monitoring Software​ CVE-2023-6407 CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability Easy UPS Online Monitoring Software (2.6-GA-01-23116 and prior (Windows 10, 11, Windows Server 2016, 2019, 2022)) SEVD-2023-346-03 PDF SEVD-2023-346-03 CSAF
2023/12/12 ​​PowerLogic ION8650, PowerLogic ION8800​ CVE-2023-5984 ​
CVE-2023-5985
CWE-494 : Download of Code Without Integrity Check vulnerability
CWE-79: Improper Neutralization of Input During Web Page Generation vulnerability
ION8650 (all versions)
ION8800 (all versions)
SEVD-2023-318-01 (V1.1) PDF SEVD-2023-318-01 (V1.1) CSAF
2023/11/14 ​​EcoStruxure Power Monitoring Expert and EcoStruxure™ Power Operation with Advanced Reporting and Dashboards Module CVE-2023-5986
CVE-2023-5987
CWE-601 URL Redirection to Untrusted Site vulnerability
CWE-79 Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) vulnerability
EcoStruxure™ Power Monitoring Expert (PME) (EcoStruxure™ Power Monitoring Expert (PME) 2021 prior to CU2, EcoStruxure™ Power Monitoring Expert (PME) 2020 prior to CU3)
EcoStruxure™ Power Operation (EPO) – Advanced Reporting and Dashboards Module (Advanced Reporting and Dashboards Module 2021 prior to CU2 for EcoStruxure™ Power Operation 2021)
EcoStruxure™ Power SCADA Operation (PSO) - Advanced Reporting and Dashboards Module (Advanced Reporting and Dashboards Module 2020 prior to CU3 EcoStruxure™ Power SCADA Operation (PSO) 2020 or 2020 R2)
SEVD-2023-318-02 PDF SEVD-2023-318-02 CSAF
2023/10/10 SpaceLogic C-Bus Toolkit CVE-2023-5402
CVE-2023-5399
CWE-269: Improper Privilege Management vulnerability
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability
SpaceLogic C-Bus Toolkit (v1.16.2.2 and prior) SEVD-2023-283-01 PDF SEVD-2023-283-01 CSAF
2023/10/10 EcoStruxure Power Monitoring Expert and EcoStruxure™
Power Operation with Advanced Reports
CVE-2023-5391 CWE-502: Deserialization of untrusted data vulnerability EcoStruxure™ Power Monitoring Expert (PME) (All versions – prior to application of Hotfix-145271 ) EcoStruxure™ Power Operation with Advanced Reports (All versions – prior to application of Hotfix-145271)
EcoStruxure™ Power SCADA Operation with Advanced Reports (All versions – prior to application of Hotfix-145271 )
Note: Power SCADA Operation and Power Operation without Advanced Reports are not affected.
SEVD-2023-283-02 PDF SEVD-2023-283-02 CSAF
2023/09/12 ​​​IGSS (Interactive Graphical SCADA System)​​ CVE-2023-4516​ CWE-306: Missing Authentication for Critical Function vulnerability. IGSS Update Service
(IGSSupdateservice.exe) (v16.0.0.23211 and prior)
SEVD-2023-255-01 PDF SEVD-2023-255-01 CSAF
2023/08/08 ​​​Pro-face GP-Pro EX​​ CVE-2023-3953 CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. GP-Pro EX WinGP for iPC (v4.09.450 and prior)
GP-Pro EX WinGP for PC/AT (v4.09.450 and prior)
SEVD-2023-220-01 PDF SEVD-2023-220-01 CSAF
2023/07/11 ​StruxureWare Data Center Expert CVE-2023-37196​
CVE-2023-37197​
CVE-2023-37198
CVE-2023-37199
CWE-89: Improper Neutralization of Special Elements
CWE-94: Improper Control of Generation of Code
StruxureWare Data Center Expert (now known as EcoStruxure™ IT Data Center Expert) (v7.9.3 and earlier) SEVD-2023-192-01 PDF SEVD-2023-192-01 CSAF
2023/07/11 ​​Accutech Manager​ CVE-2023-29414 CWE-120: Buffer Copy without Checking Size of Input (Classic Buffer Overflow) Accutech Manager (Version 2.7 and prior) SEVD-2023-192-03 PDF SEVD-2023-192-03 CSAF
2023/06/13 ​EcoStruxure™ Operator Terminal Expert and Pro-face BLUE CVE-2023-1049 CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability EcoStruxure™ Operator Terminal Expert (v3.3 SP1 and prior)
Pro-face BLUE (v3.3 SP1 and prior)
SEVD-2023-164-01 PDF SEVD-2023-164-01 CSAF
2023/06/13 ​​​IGSS (Interactive Graphical SCADA System)​​ CVE-2023-3001 CWE-502: Deserialization of Untrusted Data IGSS Dashboard (DashBoard.exe) (v16.0.0.23130 and prior) SEVD-2023-164-02 PDF SEVD-2023-164-02 CSAF
2023/06/13 ​​Foxboro SCADA​ Schneider Electric is aware of ​a vulnerability​ in the AVEVA™ InTouch component which is included as part of Foxboro SCADA product. Foxboro SCADA (All versions) SEVD-2023-164-03 PDF SEVD-2023-164-03 CSAF
2023/06/13 EcoStruxure™ Foxboro DCS Control Core Services CVE-2023-2569
CVE-2023-2570
CWE-787: Out-of-Bounds Write
CWE-129: Improper Validation of Array Index
EcoStruxure™ Foxboro DCS Control Core Services (All versions prior to patch HF98577958) SEVD-2023-164-04 PDF SEVD-2023-164-04 CSAF
2023/06/13 PowerLogic ION7400 / PM8000 / ION9000 Power Meters CVE-2022-46680 CWE-319: Cleartext transmission of sensitive information PowerLogic ION9000, PowerLogic ION7400
PowerLogic PM8000 (Prior to 4.0.0)
PowerLogic ION8650 (All Versions)
PowerLogic ION8800 (All Versions)
Legacy ION products (All Versions)
SEVD-2023-129-03 PDF (V1.1) SEVD-2023-129-03 CSAF (V1.1)
2023/05/09 OPC Factory Server CVE-2023-2161 CWE-611: Improper Restriction of XML External Entity Reference OPC Factory Server (OFS) (Version prior to V3.63SP2) SEVD-2023-129-01 PDF SEVD-2023-129-01 CSAF
2023/05/09 EcoStruxure™ Power Operation
EcoStruxure™ Power SCADA Operation
Schneider Electric is aware of ​multiple vulnerabilities​ in the AVEVA™ Plant SCADA product which is included as part of ​​EcoStruxure™ Power Operation, EcoStruxure™ Power SCADA Operation​ ​products. EcoStruxure™ Power Operation (Version 2022, Versions 2021 CU3 and prior)
EcoStruxure™ Power SCADA Operation (Versions 2020 R2 and prior)
SEVD-2023-129-02 PDF SEVD-2023-129-02 CSAF
2023/05/09 Power SCADA Anywhere Schneider Electric is aware of ​multiple vulnerabilities​ in the AVEVA™ Plant SCADA Access Anywhere which is an optional component of the EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation products. EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation configured with Power SCADA Anywhere (Power SCADA Anywhere Versions 1.1 and 1.2) SEVD-2023-129-04 PDF SEVD-2023-129-04 CSAF
2023/05/09 NicheStack TCP/IP Vulnerabilities (INFRA:HALT) in Lexium ILE, ILA, ILS, and Communication Option Boards for Altivar and Lexium32 drives CVE-2021-31400
CVE-2021-31401
CVE-2020-35683
CVE-2020-35684
CVE-2020-35685
Schneider Electric is aware of multiple vulnerabilities in HCC Embedded’s NicheStack TCP/IP third party component, which is integrated into Schneider Electric’s Lexium ILE, ILA, ILS, Altivar Profinet Communication Module (VW3A3627), Altivar and Lexium Ethernet TCP/IP Communication Module (VW3A3616), and Altivar Profinet - Communication Card (VW3A3327) products. Lexium ILE ILA ILS firmware version (V01.110 and prior) SEVD-2021-217-01 (V5.0) PDF SEVD-2021-217-01 (V5.0) CSAF
2023/04/26 ​​​KNX Publicly Available Exploit​​ Schneider Electric is aware of publicly available exploit affecting KNX home and building automation systems. The products used in these systems may come from a variety of different vendors, including Schneider Electric spaceLYnk, Wiser for KNX (formerly homeLYnk), and FellerLYnk products. spaceLYnk
Wiser for KNX (formerly homeLYnk)
FellerLYnk
SESB-2023-01 PDF
2023/04/11 Conext™ Gateway/ InsightHome and InsightFacility CVE-2023-29410 CWE-20: Improper Input Validation InsightHome (v1.16 Build 004 and prior)
InsightFacility (v1.16 Build 004 and prior)
Conext™ Gateway (Discontinued in 2019) (v1.16 Build 004 and prior)
SEVD-2023-101-02 PDF SEVD-2023-101-02 CSAF
2023/04/11 Easergy Builder CVE-2022-34755 CWE-427 - Uncontrolled Search Path Element Easergy Builder installer (Version 1.7.23 and older) SEVD-2023-101-06 PDF SEVD-2023-101-06 CSAF
2023/04/11 SCADAPack Workbench CVE-2022-0221 CWE-611: Improper Restriction of XML External Entity Reference SCADAPack Workbench (Version 6.6.8a and prior) SEVD-2022-087-01 (V2.0) PDF SEVD-2022-087-01 (V2.0) CASF
2023/04/11 CODESYS V3 Runtime, Development System, and Gateway Vulnerabilities CVE-2021-33485
CVE-2021-29241
CVE-2021-29240
CVE-2021-21863
CVE-2021-21864
CVE-2021-21865
CVE-2021-21866
CVE-2021-21867
CVE-2021-21868
CVE-2021-21869
Multiple Vulnerabilities M241/M251 (All Versions)
EcoStruxure Machine Expert (All Versions)
Harmony/Magelis HMISTU Series, HMIGTO Series, HMIGTU Series, HMIGTUX Series, HMIGK Series, HMISCU Series, Vijeo Designer (V6.2 SP11 Hotfix 3 and prior)
Eurotherm E+PLC100 (All Versions)
Eurotherm E+PLC400 (V1.3.0.1 and prior)
Eurotherm E+PLC tools (V1.3.0.1 and prior)
Easy Harmony ET6 HMIET Series (Vijeo Designer Basic V1.2.1 and later)
Easy Harmony GXU HMIGXU Series (Vijeo Designer Basic V1.2.1 and later)
SEVD-2022-011-06 (V7.0) PDF SEVD-2022-011-06 (V7.0) CSAF
2023/03/14 ​​PowerLogic™ HDPM6000​ CVE-2023-28004 CWE-129: Improper Validation of an Array Index PowerLogic™ HDPM6000 (Version 0.58.6 and prior) SEVD-2023-073-02 PDF SEVD-2023-073-02 CSAF
2023/03/14 ​​​IGSS (Interactive Graphical SCADA System)​ CVE-2023-27977
CVE-2023-27978
CVE-2023-27979
CVE-2023-27980
CVE-2023-27981
CVE-2023-27982
CVE-2023-27983
CVE-2023-27984
Multiple Vulnerabilities IGSS Data Server (IGSSdataServer.exe) (V16.0.0.23040 and prior)
IGSS Dashboard (DashBoard.exe) (V16.0.0.23040 and prior)
Custom Reports (RMS16.dll) (V16.0.0.23040 and prior)
SEVD-2023-073-04 PDF SEVD-2023-073-04 CSAF
2023/03/14 EcoStruxure™ Geo SCADA Expert​ CVE-2023-22610​
CVE-2023-22611
Notification Updated: Adjustment of the deprecated CWE of the ​CVE-2023-22610.​ EcoStruxure™ Geo SCADA Expert 2019, EcoStruxure™ Geo SCADA Expert 2020, EcoStruxure™ Geo SCADA Expert 2021 (All versions prior to October 2022)
ClearSCADA (All Versions)
SEVD-2023-010-02 (V1.1) PDF SEVD-2023-010-02 (V1.1) CSAF
2023/03/14 IGSS (Interactive Graphical SCADA System) CVE-2022-32522
CVE-2022-32523
CVE-2022-32524
CVE-2022-32525
CVE-2022-32526
CVE-2022-32527
CVE-2022-32528
CVE-2022-32529
Notification Updated: The CVE-2022-32528 description details have been clarified. IGSS Data Server (IGSSdataServer.exe) Versions prior to Version 15.0.0.22139 SEVD-2022-165-01 (V2.1) PDF SEVD-2022-165-01 (V2.1) CSAF
2023/02/14 PLC Simulator on EcoStruxure™ Control Expert and Process Expert CVE-2020-7559
CVE-2020-7538
CVE-2020-28211
CVE-2020-28212
CVE-2020-28213
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-754: Improper Check for Unusual or Exceptional Conditions
CWE-863: Incorrect Authorization
A CWE-307: Improper Restriction of Excessive Authentication Attempts
A CWE-494: Download of Code Without Integrity Check
PLC Simulator for EcoStruxure™ Control Expert, all versions
PLC Simulator for Unity Pro (former name of EcoStruxure™ Control Expert), all versions
PLC Simulator for EcoStruxure™ Process Expert, all versions
SEVD-2020-315-07 (V4.0) PDF SEVD-2020-315-07 (V4.0) CSAF
2023/02/14 ​​EcoStruxure™ Geo SCADA Expert CVE-2023-0595 A CWE-117: Improper Output Neutralization for Logs vulnerability. EcoStruxure™ Geo SCADA Expert 2019, EcoStruxure™ Geo SCADA Expert 2020, EcoStruxure™ Geo SCADA Expert 2021 (All Versions prior to October 2022)
ClearSCADA (All Versions)
SEVD-2023-045-01 PDF SEVD-2023-045-01 CSAF
2023/02/14 ​​StruxureWare Data Center Expert​ ​CVE-2023-25547
​CVE-2023-25548
CVE-2023-25549​
CVE-2023-25550​
​CVE-2023-25551
CVE-2023-25552
CVE-2023-25553
CVE-2023-25555
Multiple Vulnerabilities StruxureWare Data Center Expert (7.9.2 and earlier) SEVD-2023-045-02 PDF SEVD-2023-045-02 CSAF
2023/02/14 ​​​Merten KNX Devices CVE-2023-25556 A CWE-287: Improper Authentication vulnerability. Merten INSTABUS Tastermodul 1fach System M 625199 (Program Version 1.0)
Merten INSTABUS Tastermodul 2fach System M 625299 (Program Version 1.0)
Merten Tasterschnittstelle 4fach plus 670804 (Program Version 1.0 & 1.2)
Merten KNX ARGUS 180/2,20M UP SYSTEM 631725 (Program Version 1.0)
Merten Jalousie-/Schaltaktor REG-K/8x/16x/10 m. HB 649908 (Product discontinued) (Program Version 1.0)
Merten KNX Uni-Dimmaktor LL REG-K/2x230/300 W MEG6710-0002 (Product discontinued) (Program Version 1.0 & 1.1)
Merten KNX Schaltakt.2x6A UP m.2 Eing. MEG6003-0002 (Product discontinued) (Prgram Version 0.1)
SEVD-2023-045-03 PDF SEVD-2023-045-03 CSAF
2023/02/14 NetBotz 4 -355/450/455/550/570 CVE-2022-43376
CVE-2022-43377
CVE-2022-43378
Multiple Vulnerabilities NetBotz 4 -355/450/455/550/570 (V4.7.0 and earlier) SEVD-2022-312-01 (V2.0) PDF SEVD-2022-312-01 (V2.0) CSAF
2023/02/14 Web Server on Modicon M340, Legacy Offers Modicon Quantum and Premium and Associated Communication Modules CVE-2021-22785
CVE-2021-22788
CVE-2021-22787
Notification Updated: A remediation is available for Modicon M340 Ethernet Communication Modules BMXNOE0100 (H) and BMXNOE0110 (H). Modicon M340 CPUs (BMXP34* versions prior to V3.40)
Modicon M340 X80 Ethernet Communication modules BMXNOC0401 prior to V2.11, BMXNOR0200H RTU prior to V1.70 IR24)
Modicon Premium Processors with Integrated Ethernet COPRO (TSXP574634 all versions, TSXP575634 all versions, TSXP576634 all versions)
Modicon Quantum Processors with Integrated Ethernet COPRO (140CPU65xxxxx all versions)
Modicon Quantum Communication Modules (140NOE771x1 all versions, 140NOC78x00 all versions, 140NOC77101 all versions)
Modicon Premium Communication Modules (TSXETY4103 all versions, TSXETY5103 all versions)
SEVD-2021-257-02 (V3.0) PDF SEVD-2021-257-02 (V3.0) CSAF
2023/02/14 Modicon Web Server CVE-2020-7562
CVE-2020-7563
CVE-2020-7564
Notification Updated: A remediation is available on Modicon M340 Ethernet Communication Modules BMXNOE0100 (H) and BMXNOE0110 (H). Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) SEVD-2020-315-01 (V4.0) PDF SEVD-2020-315-01 (V4.0) CSAF
2023/01/11 Easy UPS Online Monitoring Software CVE-2022-42970
CVE-2022-42971
CVE-2022-42973
CVE-2022-42972​
Notification Updated: The Easy UPS Online Monitoring Software has been separated by the APC and Schneider Electric brand names. APC Easy UPS Online Monitoring Software (V2.5-GA and prior (Windows 7, 10, 11 Windows Server 2016, 2019, 2022) (V2.5-GA-01-22261 and prior (Windows 11, Windows Server 2019, 2022))
Schneider Electric Easy UPS Online Monitoring Software (V2.5-GA and prior (Windows 7, 10, 11 Windows Server 2016, 2019, 2022) (V2.5-GA-01-22261 and prior (Windows 11, Windows Server 2019, 2022))
SEVD-2022-347-01 (V2.0) PDF SEVD-2022-347-01 (V2.0) CSAF
2023/01/10 ​​EcoStruxure™ Machine Expert – HVAC (formerly SoMachine - HVAC)​ CVE-2022-2988 A CWE-787: Out-of-bounds Write vulnerability. SoMachine - HVAC (Version 2.1.0 and prior)
EcoStruxure™ Machine Expert – HVAC (Version 1.4.0 and prior)
SEVD-2023-010-01 PDF SEVD-2023-010-01 CSAF
2023/01/10 ​​EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2​ CVE-2022-38138 A CWE-824: Access of uninitialized Pointer vulnerability. EcoStruxure™ Power SCADA Operation 2020 (Version 2020 and 2020 CU1)
EcoStruxure™ Power SCADA Operation 2020 R2 (Version 2020 R2 and 2020 R2 CU1, 2020 R2 CU2, and 2020 R2 CU3)
EcoStruxure™ Power Operation 2021 (Version 2021, 2021 CU1, 2021 CU2 and 2021 CU3)
Power SCADA Operation (Version 9.0)
PowerSCADA Expert (Version 8.x)
SEVD-2023-010-03 PDF SEVD-2023-010-03 CSAF
2023/01/10 ​​EcoStruxure™ Power SCADA Anywhere​ CVE-2022-1467 A CWE-668: Exposure of Resource to Wrong Sphere vulnerability. EcoStruxure™ Power SCADA Anywhere (Versions 2022, 2021, 2020 R2, 2020, 9.0, 8.x) SEVD-2023-010-04 PDF SEVD-2023-010-04 CSAF
2022/12/13 ​Saitel DR RTU CVE-2020-6996​ CWE-787: Out-of-bounds write vulnerability. SAITEL DR RTU (Firmware from Baseline_11.06.01 to Baseline_11.06.14) SEVD-2022-347-02 PDF SEVD-2022-347-02 CSAF
2022/12/13 ​​​EcoStruxure Power Commission​ CVE-2022-4062 A CWE-285: Improper Authorization vulnerability. EcoStruxure Power Commission (V2.25 and prior versions) SEVD-2022-347-03 PDF SEVD-2022-347-03 CSAF
2022/11/22 APC Smart-UPS SMT, SMC, SMX, SCL, SRC, XU, XP, CSH2, SURTD, SMTL, SRT, and select SRTL Series CVE-2022-22805
CVE-2022-22806
CVE-2022-0715
Notification Updated: In the Affected Products and Versions section, new series IDs were added to SMT, SMC, and SMX. Added CSH2 to the available remediations sections. Added mitigations for products with the specified IDs that have been phased out and will not have firmware remediation. APC Smart-UPS Family and SmartConnect Family (see Security Notification for affected series and versions) SEVD-2022-067-02 (V7.0) PDF SEVD-2022-067-02 (V7.0) CSAF
2022/11/08 homeLYnk (Wiser For KNX) and spaceLYnk CVE-2021-22732
CVE-2021-22733
CVE-2021-22734
CVE-2021-22735
CVE-2021-22736
CVE-2021-22737
CVE-2021-22738
CVE-2021-22739
CVE-2021-22740
Notification Updated: The CWE for CVE-2021-22737 has been updated.

No additional action is required for customers who have already followed the remediation instructions provided.
homeLYnk (Wiser For KNX) and spaceLYnk (V2.60 and prior) SEVD-2021-130-04 (V2.0) PDF SEVD-2021-130-04 (V2.0) CSAF
2022/11/08 EcoStruxure EV Charging Expert CVE-2022-22807
CVE-2022-22808
CWE-352: Cross-Site Request Forgery
CWE-1021 Improper Restriction of Rendered UI Layers or Frames
EcoStruxure EV Charging Expert (formerly known as EVlink Load Management System) (All Versions prior to SP8 (Version 01)V4.0.0.13) SEVD-2022-039-02 (V2.0) PDF SEVD-2022-039-02 (V2.0) CSAF
2022/11/08 C-Bus Toolkit and C-Gate Server CVE-2021-22716
CVE-2021-22717
CVE-2021-22718
CVE-2021-22719
CVE-2021-22720
CVE-2021-22748
CVE-2021-22796
Notification Updated: The CWE for CVE-2021-22716 has been updated. No additional action is required for customers who have already followed the remediation instructions provided. C-Bus Toolkit V1.15.9 and prior
C-Gate Server 2.11.7 and prior
SEVD-2021-103-01 (V4.0) PDF SEVD-2021-103-01 (V4.0) CSAF
2022/10/14 EcoStruxure™ Power Operation 2021, EcoStruxure™ Power SCADA Operation 2020 and EcoStruxure™ Power SCADA Operation 2020 R2 CVE-2022-22727 Notification Updated: There is an update to the EcoStruxure™ Power SCADA Operation 2020 remediation advising customers to move to 2020 R2 instead of 2020 CU2. EcoStruxure™ Power SCADA Operation 2020 Version 2020 and 2020 CU1 (Version 2020 and 2020 CU1)
EcoStruxure™ Power SCADA Operation 2020 R2 (Version 2020 R2 Prior to CU1)
EcoStruxure™ Power Operation 2021 (Version 2021, 2021 CU1 and 2021 CU2)
SEVD-2022-284-04 (V1.1) PDF SEVD-2022-284-04 (V1.1) CSAF
2022/10/11 EcoStruxure™ Operator Terminal Expert and Pro-face BLUE CVE-2022-41666
CVE 2022-41667
CVE-2022-41668
CVE-2022-41669
CVE-2022-41670
CVE-2022-41671
Multiple Vulnerabilities EcoStruxure™ Operator Terminal Expert (V3.3 Hotfix 1 or prior)
Pro-face BLUE (V3.3 Hotfix1 or prior)
SEVD-2022-284-01 PDF SEVD-2022-284-01 CSAF
2022/10/11 EcoStruxure™ Panel Server Box (PAS900) CVE-2022-30790
CVE-2022-30552
Multiple Vulnerabilities EcoStruxure™Panel Server Box (PAS900) (V3.1.16 and prior) SEVD-2022-284-02 PDF SEVD-2022-284-02 CSAF
2022/10/11 ISaGRAF Workbench for SAGE RTU CVE-2022-2463
CVE-2022-2464
CVE-2022-2465
Multiple Vulnerabilities SAGE RTU C3414 CPU (Current) with optional ISaGRAF software versions prior to 6.6.10 (All firmware versions prior to C3414-500-S02K5_P5)
SAGE RTU C3413, C3412 CPU (Obsolete CPUs) with optional ISaGRAF software versions prior to 6.6.10 (All firmware versions)
SEVD-2022-284-03 PDF SEVD-2022-284-03 CSAF
2022/10/11 Apache Log4j Vulnerability (Log4Shell) CVE-2021-44228
CVE-2021-45046
CVE-2021-45105
CVE-2021-4104
CVE-2021-44832
Notification Updated: A remediation is now available for Netbotz 750/755. Schneider Electric is aware of the vulnerabilities impacting Apache Log4j, including CVE-2021-44228, also known as Log4Shell. Our cybersecurity team is actively investigating the impact of the vulnerability on Schneider Electric offers and will continuously update this notification as information becomes available. SESB-2021-347-01 (V14.0) PDF SESB-2021-214-01 (V2.14) CSAF
2022/09/13 EcoStruxure Machine SCADA Expert and Pro-face BLUE Open Studio N/A Deserialization of Untrusted Data vulnerability exists that can lead to arbitrary code execution, information disclosure, or denial of services when the project file is loaded. EcoStruxure Machine SCADA Expert 2020 Service Pack 2 (V20.0.2 or prior)
BLUE Open Studio 2020 Service Pack 2 (V20.0.2 or prior)
SEVD-2022-256-01 PDF SEVD-2022-256-01 CSAF
2022/09/13 Wind River VxWorks Vulnerabilities (URGENT/11) CVE-2019-12256
CVE-2019-12257
CVE-2019-12255
CVE-2019-12260
CVE-2019-12261
CVE-2019-12263
CVE-2019-12258
CVE-2019-12259
CVE-2019-12262
CVE-2019-12264
CVE-2019-12265
Notification Updated: CANopen X80 Communication Module (BMECXM0100) and Profibus Remote Master (TCSEGPA23F14F) added to the list of affected products, along with their final mitigations. See Security Notification for specific product versions affected. SESB-2019-214-01 (V2.14) PDF SESB-2019-214-01 CSAF (V2.14)
2022/09/13 Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules CVE-2020-7549 Notification Updated: A fix is available for Modicon M340 X80 Ethernet Communication Module BMXNOC0401. Modicon M340 CPUs (BMXP34* versions prior to V3.30)
Modicon M340 Ethernet Communication modules (BMXNOE0100 (H) versions prior to V3.4, BMXNOE0110 (H) versions prior to V6.5, BMXNOC0401 (H) all versions)
Modicon Quantum communication modules (140NOE771x1 versions prior to V7.3, 140NOC78x00 all versions, 140NOC77101 all versions)
Modicon Quantum processors with integrated Ethernet COPRO (140CPU65xx0 all versions)
Modicon Premium communication modules (TSXETY4103 all versions, TSXETY5103 all versions)
Modicon Premium processors with integrated Ethernet COPRO (TSXP574634 all versions, TSXP575634 all versions, TSXP576634 all versions)
SEVD-2020-343-06 (V2.0) PDF SEVD-2020-343-06 (V2.0) CSAF
2022/09/13 Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and Associated Communication Modules CVE-2020-7535 Notification Updated: A remediation is available for ModiconM340 X80 Ethernet Communication Modules BMXNOC0401. Modicon M340
Modicon Premium
Modicon Quantum
SEVD-2020-343-05 (V3.0) PDF SEVD-2020-343-05 (V3.0) CSAF
2022/09/13 SNMP Service on Modicon M340 and Associated Communication Modules CVE-2020-7536 Notification Updated: A remediation is available for Modicon M340 X80 Ethernet Communication module BMXNOC0401. Modicon M340 CPUs (BMXP34* versions prior to V3.30)
Modicon M340 Communication Ethernet modules (BMXNOC0401 versions prior to V2.11BMXNOE0100 (H) versions prior to V3.4, BMXNOE0110 (H) versions prior to V6.6, BMXNOR0200H V1.7 IR22)
SEVD-2020-343-07 (V2.1) PDF SEVD-2020-343-07 (V2.1) CSAF
2022/08/19 OPC UA and X80 advanced RTU Modicon Communication Modules CVE-2022-34759
CVE-2022-34760
CVE-2022-34761
CVE-2022-34762
CVE-2022-34763
CVE-2022-34764
CVE-2022-34765
Notification Updated: There is a remediation for the X80 Advanced RTU Communication Module (BMENOR2200). OPC UA Modicon Communication Module (BMENUA0100) V1.10 and prior
X80 advanced RTU Communication Module (BMENOR2200H) V1.0
X80 advanced RTU Communication Module (BMENOR2200H) V2.01 and later
SEVD-2022-193-01 (V3.0) PDF SEVD-2022-193-01 (V3.0) CSAF
2022/08/09 Treck TCP/IP Vulnerabilities (Ripple20) CVE-2020-11896
CVE-2020-11897
CVE-2020-11898
CVE-2020-11899
CVE-2020-11900
CVE-2020-11901
CVE-2020-11902
CVE-2020-11903
CVE-2020-11904
CVE-2020-11905
CVE-2020-11906
CVE-2020-11907
CVE-2020-11908
CVE-2020-11909
CVE-2020-11910
CVE-2020-11911
CVE-2020-11912
CVE-2020-11913
CVE-2020-11914
Notification Updated - A remediation is available for the ATV6000 Medium Voltage Altivar Process Drive. See Security Notification SEVD-2020-175-01 (V2.18) PDF SEVD-2020-175-01 (V2.18) CSAF
2022/08/09 EcoStruxure™ Control Expert CVE-2022-37302 CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. EcoStruxure™ Control Expert (V15.1 HF001 and prior) SEVD-2022-221-03 PDF SEVD-2022-221-03 CSAF
2022/07/12 SpaceLogic C-Bus Home Controller, formerly known as C-Bus Wiser Home Controller MK2 CVE-2022-34753 A CWE-78: Improper Neutralizationof Special Elements used in an OS Command ('OS Command Injection') SpaceLogic C-Bus Home Controller (5200WHC2), formerly known as C-Bus Wiser Homer Controller MK2 V1.31.460 and prior SEVD-2022-193-02 PDF SEVD-2022-193-02 CSAF
2022/07/12 Acti9 PowerTag Link C CVE-2022-34754 CWE-269: Improper Privilege Management Acti9 PowerTag Link C (A9XELC10-A) V1.7.5 and prior
Acti9 PowerTag Link C (A9XELC10-B) V2.12.0 and prior
SEVD-2022-193-03 PDF SEVD-2022-193-03 CSAF
2022/07/12 Easergy P5 CVE-2022-34756
CVE-2022-34757
CVE-2022-34758
Multiple Vulnerabilities Easergy P5 Firmware V01.401.102 and prior SEVD-2022-193-04 PDF SEVD-2022-193-04 CSAF
2022/07/12 IGSS (Interactive Graphical SCADA System) CVE-2022-24324
CVE-2022-2329
Notification Updated: An additional vulnerability, CVE-2022-2329, was remediated with the released patch. IGSS Data Server (V15.0.0.22073 and prior) SEVD-2022-102-01 (V2.0) PDF SEVD-2022-102-01 (V2.0) CSAF
2022/07/12 AT&T Labs Compressor (XMill) and Decompressor (XDemill) used by EcoStruxure™ Control Expert
EcoStruxure™ Process Expert and SCADAPack RemoteConnect™ for x70
CVE-2021-21810
CVE-2021-21811
CVE-2021-21812
CVE-2021-21813
CVE-2021-21814
CVE-2021-21815
CVE-2021-21825
CVE-2021-21826
CVE-2021-21827
CVE-2021-21828
CVE-2021-21829
CVE-2021-21830
CVE-2022-26507
Notification Updated: A release is available for SCADAPack RemoteConnect™ R2.7.3 that addresses workstation vulnerabilities. EcoStruxure™ Control Expert (All versions prior to V15.1 HF001 including former Unity Pro)
EcoStruxure™ Process Expert (All versions prior to V2021 including former HDCS)
SCADAPack RemoteConnect™ for x70 (All versions)
SEVD-2021-222-02 (V4.0) PDF SEVD-2021-222-02 (V4.0) CSAF
2022/07/12 EcoStruxure™ Control Expert
EcoStruxure™ Process Expert
SCADAPack RemoteConnect™ for x70
CVE-2021-22797 Notification Updated: A release is available for SCADAPack RemoteConnect™ R2.7.3 that addresses workstation vulnerabilities. EcoStruxure™ Control Expert (All versions including former Unity Pro)
EcoStruxure™ Process Expert (All versions including former HDCS)
SCADAPack RemoteConnect™ for x70 (All versions)
SEVD-2021-257-01 (V3.0) PDF SEVD-2021-257-01 (V3.0) CSAF
2022/06/16 Data Center Expert CVE-2022-32518
CVE-2022-32519
CVE-2022-32520
CVE-2022-32521
CWE-257: Storing Passwords in a Recoverable Format
CWE 502: Deserialization of Untrusted Data
CWE-522: Insufficiently Protected Credentials
Data Center Expert (V7.9.0 and prior) SEVD-2022-165-04 (V2.0) PDF SEVD-2022-165-04 (V2.0) CSAF
2022/06/14 Conext™ Combox CVE-2022-32515
CVE-2022-32516
CVE-2022-32517
Multiple Vulnerabilities Conext™ ComBox All Versions SEVD-2022-165-03 PDF SEVD-2022-165-03 CSAF
2022/06/14 Geo SCADA Mobile CVE-2022-32530 CWE-668: Exposure of Resource to Wrong Sphere Geo SCADA Mobile Version Build 222 and prior SEVD-2022-165-02 PDF SEVD-2022-165-02 CSAF
2022/06/14 EcoStruxure Power Commission CVE-2022-0223
CVE-2022-22731
CVE-2022-22732
Multiple Vulnerabilities EcoStruxure Power Commission Versions prior to V2.22 SEVD-2022-165-05 PDF SEVD-2022-165-05 CSAF
2022/06/14 Schneider Electric C-Bus Home Automation Products CVE-2022-32513
CVE-2022-32514
Multiple Vulnerabilities Schneider Electric C-Bus Network Automation Controller - LSS5500NAC V1.10.0 and prior
Schneider Electric Wiser for C-Bus Automation Controller - LSS5500SHAC V1.10.0 and prior
Clipsal C-Bus Network Automation Controller - 5500NAC V1.10.0 and prior
Clipsal Wiser for C-Bus Automation Controller - 5500SHAC V1.10.0 and prior
SpaceLogic C-Bus Network Automation Controller - 5500NAC2 V1.10.0 and prior
SpaceLogic C-Bus Application Controller - 5500AC2 V1.10.0 and prior
SEVD-2022-165-06 PDF SEVD-2022-165-06 CSAF
2022/06/14 CanBRASS CVE-2022-32512 CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CanBRASS Versions prior to V7.5.1 SEVD-2022-165-07 PDF SEVD-2022-165-07 CSAF
2022/06/14 EcoStruxure™ Cybersecurity Admin Expert CVE-2022-32747
CVE-2022-32748
Multiple Vulnerabilities EcoStruxure™ Cybersecurity Admin Expert(CAE) Versions 2.2 and prior SEVD-2022-165-08 PDF SEVD-2022-165-08 CSAF
2022/06/14 EcoStruxure Power Build - Rapsody CVE-2021-22697
CVE-2021-22698
Notification Update: These vulnerabilities have been fixed in V2.1.3. EcoStruxure Power Build - Rapsody software V2.1.13 and prior SEVD-2021-012-02 (V2.0) PDF SEVD-2021-012-02 (V2.0) CSAF
2022/06/14 EcoStruxure™ Control Expert
EcoStruxure™ Process Expert
SCADAPack RemoteConnect™ for x70
CVE-2022-24322
CVE-2022-24323
Notification Updated: Added SCADAPack RemoteConnect™ to the list of affected products, which is impacted on versions prior to R2.7.3 through the integration of EcoStruxure™ Control Expert. EcoStruxure™ Control Expert Version 15.0 SP1 and prior
EcoStruxure™ Process Expert Version 2021 and prior
SCADAPack RemoteConnect™ for x70 All Versions prior to R2.7.3
SEVD-2022-067-01 (V2.0) PDF SEVD-2022-067-01 (V2.0) CSAF
2022/05/10 PowerLogic ION Setup CVE-2022-30232 CWE-20: Improper Input Validation PowerLogic ION Setup Versions prior to 3.2.22096.01 SEVD-2022-130-01 PDF SEVD-2022-130-01 CSAF
2022/05/10 Saitel DP RTU CVE-2020-6996 CWE-787: Out-of-bounds Write Saitel DP RTU Firmware Version Baseline_09.00.00 to Baseline_11.06.23 SEVD-2022-130-02 PDF SEVD-2022-130-02 CSAF
2022/05/10 Wiser Smart CVE-2022-30234
CVE-2022-30235
CVE-2022-30238
CVE-2022-30236
CVE-2022-30237
CVE-2022-30233
Multiple Vulnerabilities Wiser Smart EER21000 V4.5 and prior and Wiser Smart EER21001 V4.5 and prior SEVD-2022-130-03 PDF SEVD-2022-130-03 CSAF
2022/05/10 APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices CVE-2021-22810
CVE-2021-22811
CVE-2021-22812
CVE-2021-22813
CVE-2021-22814
CVE-2021-22815
Notification Updated: Remediations added for remaining affected products: APC Power Distribution products, Cooling products, Environmental Monitoring products, and Battery Management products. Network Management Card 2 (NMC2), Network Management Card 3 (NMC3), and the NMC embedded devices including:
Uninterruptible Power Supply (UPS) products
APC Power Distribution products
Cooling products
Environmental Monitoring
Battery Management products.

See notification for specific affected product and version details.
SEVD-2021-313-03 (V2.0) PDF SEVD-2021-313-03 (V2.0) CSAF
2022/04/13 APT Cyber Tools Targeting ICS/SCADA Devices Security Bulletin Schneider Electric, working in close collaboration with the United States Department of Energy, Homeland Security, and cybersecurity defense partner, Mandiant, identified and developed protective measures to defend against APT (Advanced Persistent Threat) Cyberattack Tools/Framework still in development that would target a set of our Programmable Logic Controllers (PLCs) products. SESB-2022-01
2022/03/08 Ritto Wiser™ Door CVE-2021-22783 CWE-200: Information Exposure Ritto Wiser™ Door (All versions) SEVD-2022-067-03 PDF SEVD-2022-067-03 CSAF
2022/03/08 Windows Print Spooler Embedded in EcoStruxure™ Process Expert CVE-2021-34527
CVE-2021-1675
Notification Updated - EcoStruxure™ Process Expert 2021 includes a fix for these vulnerabilities EcoStruxure™ Process Expert (All versions prior to V2021) SEVD-2021-313-04 (V2.0) PDF SEVD-2021-313-04 (V2.0) CSAF
2022/02/08 IGSS (Interactive Graphical SCADA System) CVE-2022-24310
CVE-2022-24311
CVE-2022-24312
CVE-2022-24313
CVE-2022-24314
CVE-2022-24315
CVE-2022-24316
CVE-2022-24317
Multiple Vulnerabilities IGSS Data Server: IGSSdataServer.exe (V15.0.0.22020 and prior) SEVD-2022-039-01 PDF SEVD-2022-039-01 CSAF
2022/02/08 Easergy P40 CVE-2022-22813 CWE-798: Use of Hard-coded Credentials Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware versions) SEVD-2022-039-03 PDF SEVD-2022-039-03 CSAF
2022/02/08 spaceLYnk, Wiser For KNX, fellerLYnk CVE-2022-22809
CVE-2022-22810
CVE-2022-22811
CVE-2022-22812
Multiple Vulnerabilities spaceLYnk (V2.6.2 and prior)
Wiser for KNX (formerly homeLYnk) (V2.6.2 and prior)
fellerLYnk (V2.6.2 and prior)
SEVD-2022-039-04 PDF SEVD-2022-039-04 CSAF
2022/02/08 EcoStruxure Geo SCADA Expert CVE-2022-24318
CVE-2022-24319
CVE-2022-24320
CVE-2022-24321
Multiple Vulnerabilities ClearSCADA (All Versions)
EcoStruxure GeoSCADA Expert 2019 (All Versions)
EcoStruxure Geo SCADA Expert 2020 (All Versions)
SEVD-2022-039-05 PDF SEVD-2022-039-05 CSAF
2022/02/08 Harmony/Magelis iPC SeriesHMI
Vijeo Designerand Vijeo Designer Basic
CVE-2021-22817 A CWE-276: Incorrect Default Permissions Harmony/Magelis iPC Series (All Versions)
Vijeo Designer (All Versions prior to V6.2 SP11 Multiple HotFix 4)
Vijeo Designer Basic (All Versions prior to V1.2.1)
SEVD-2022-039-06 PDF SEVD-2022-039-06 CSAF
2022/01/11 Ethernet and Web server on Modicon M340 controller and Communication Modules CVE-2022-22724
CVE-2020-7534
CWE-352: Cross-Site Request Forgery (CSRF) & CWE-400: Uncontrolled Resource Consumption Modicon M340 CPUs (BMXP34 - All Versions)
Modicon Quantum CPUs with integrated Ethernet (Copro) (140CPU65 - All Versions)
Modicon Premium CPUs with integrated Ethernet (Copro) (TSXP57 - All Versions)
Modicon M340 ethernet modules (BMXNOC040, BMXNOE01, BMXNOR0200H - All Versions)
Modicon Quantum and Premiumfactory cast communication modules (140NOE77111, 140NOC78*00, TSXETY5103, TSXETY4103 - All Versions)
SEVD-2022-011-01 PDF SEVD-2022-011-01 CSAF
2022/01/11 Easergy T300 CVE-2020-8597 CWE-120: Buffer Copy without Checking Size of Input Easergy T300 (Only products connected to a 3G/4G network using the following T300 modems are vulnerable:
Easergy HU250 3G modem box - Five Bands UMTS/HSPA+
Easergy HU250 4G modem box with GPS clock synchronization Firmware V2.7.1 and prior)
SEVD-2022-011-02 PDF SEVD-2022-011-02 CSAF
2022/01/11 Easergy P5 CVE-2022-22722
CVE-2022-22723
CWE-798: Use of Hard-coded Credentials & CWE-120: Buffer Copy without Checking Size of Input Easergy P5 (All firmware versions prior to V01.401.101) SEVD-2022-011-03 PDF SEVD-2022-011-03 CSAF
2022/01/11 Easergy P3 CVE-2022-22725 CWE-120: Buffer Copy without Checking Size of Input Easergy P3 (All versions prior to V30.205) SEVD-2022-011-04 PDF SEVD-2022-011-04 CSAF
2022/01/11 ConneXium Tofino Firewall and Loadable Security Modules CVE-2021-30061
CVE-2021-30064
CVE-2021-30065
CVE-2021-30066
CVE-2021-30062
CVE-2021-30063
Multiple Vulnerabilities ConneXium Tofino Firewall – part number TCSEFEA23F3F22 - Version prior to v03.23
ConneXium Tofino OPC-LSM – part number TCSEFM0000 - Version prior to Firewall host version v03.23
ConneXium Tofino Firewall – part number TCSEFEA23F3F20/21 - All Versions
SEVD-2022-011-05 PDF SEVD-2022-011-05 CSAF
2022/01/11 EcoStruxure™ Power Monitoring Expert CVE-2022-22726
CVE-2022-22727
CVE-2019-8963
CVE-2022-22804
Multiple Vulnerabilities EcoStruxure Power Monitoring Expert (All Versions 2020 and prior) SEVD-2022-011-07 PDF SEVD-2022-011-07 CSAF
2021/12/14 EVlink City / Parking / Smart Wallbox Charging Stations CVE-2021-22724
CVE-2021-22725
CVE-2021-22818
CVE-2021-22819
CVE-2021-22820
CVE-2021-22821
CVE-2021-22822
Multiple Vulnerabilties EVlink City (EVC1S22P4 / EVC1S7P4)
EVlink Parking (EVW2 / EVF2 / EVP2PE)
EVlink Smart Wallbox EVB1A - All versions prior to R8 V3.4.0.2
SEVD-2021-348-02 PDF SEVD-2021-348-02 CSAF
2021/12/14 IGSS (Interactive Graphical SCADA System) CVE-2021-22823
CVE-2021-22824
CWE-306: Missing Authentication for Critical Function
CWE-120: Buffer Copy without Checking Size of Input
IGSS Data Collector (dc.exe) (V15.0.0.21320 and prior) SEVD-2021-348-01 PDF SEVD-2021-348-01 CSAF
2021/12/14 EcoStruxure™ Power Monitoring Expert CVE-2021-22826
CVE-2021-22827
Multiple Vulnerabilties EcoStruxure™ Power Monitoring Expert V9.0 and prior SEVD-2021-348-03
2021/12/14 APC by Schneider Electric Rack PDU CVE-2021-22825 CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') AP7xxxx and AP8xxx with NMC2. (V6.9.6 and prior)
AP7xxx and AP8xxx with NMC3 (V1.1.0.3 and prior)
APDU9xxx with NMC3 (V1.0.0.28 and prior)
SEVD-2021-348-04 PDF SEVD-2021-348-04 CSAF
2021/12/14 Web Server on Modicon M580 Controllers and Communication Modules (V4.0) CVE-2019-6848
CVE-2019-6849
CVE-2019-6850
Multiple Vulnerabilities (December 2021 Update: A fix is now available for CVE-2019-6849 on the BMENOC0321) Modicon M580
Modicon BMENOC 0311
Modicon BMENOC 0321
SEVD-2019-281-04 (V4.0)
2021/11/09 Cyber Attacks against KNX Systems Improperly Exposed to the Internet Schneider Electric is aware of confirmed reports of cyber-attacks targeting KNX home and building automation systems utilizing a KNXnet/IP Ethernet to KNX gateway or router that has been improperly exposed to the Internet.

See security bulletin for recommended mitigations.
SESB-2021-313-01
2021/11/09 SCADAPack 300E Series RTU CVE-2021-22816 CWE-754: Improper Check for Unusual or Exceptional Conditions SCADAPack 312E, 313E, 314E, 330E, 333E, 334E, 337E, 350E and 357E RTUs with firmware V8.18.1 and prior SEVD-2021-313-01 PDF SEVD-2021-313-01 CSAF
2021/11/09 Schneider Electric Software Update (SESU) CVE-2021-22799 CWE-331: Insufficient Entropy Schneider Electric Software Update, V2.3.0 through V2.5.1 SEVD-2021-313-02 PDF SEVD-2021-313-02 CSAF
2021/11/09 TelevisAir Dongle BTLE - - TelevisAir V3.0 Dongle BTLE (part number ADBT42* and prior) SEVD-2021-313-06
2021/11/09 Eurotherm GUIcon CVE-2021-22807
CVE-2021-22808
CVE-2021-22809
Multiple Vulnerabilities Eurotherm by Schneider Electric GUIcon Version 2.0 (Build 683.003) and prior SEVD-2021-313-07 PDF SEVD-2021-313-07 CSAF
2021/10/12 spaceLYnk
Wiser For KNX
fellerLYnk
CVE-2021-22806 CWE-669: Incorrect Resource Transfer Between Spheres spaceLYnk V2.6.1 and prior
Wiser for KNX V2.6.1 and prior
fellerLYnk V2.6.1 and prior
SEVD-2021-285-01 PDF SEVD-2021-285-01 CSAF
2021/10/12 ConneXium Network Manager (CNM) Software CVE-2021-22801 CWE-269: Improper Privilege Management ConneXium Network Manager (Ethernet network management software) – all versions SEVD-2021-285-02 PDF SEVD-2021-285-02 CSAF
2021/10/12 IGSS (Interactive Graphical SCADA System) CVE-2021-22802
CVE-2021-22803
CVE-2021-22804
CVE-2021-22805
Multiple Vulnerabilties IGSS Data Collector (dc.exe) V15.0.0.21243 and prior SEVD-2021-285-03 PDF SEVD-2021-285-03 CSAF
2021/10/12 Modicon M218 Logic Controller CVE-2021-22800 CWE-20: Improper Input Validation Modicon M218 logic controller firmware version v5.1.0.6 and prior. SEVD-2021-285-04 PDF SEVD-2021-285-04 CSAF
2021/10/12 Conext™ Advisor & Conext™ Control V2 CVE-2019-11135
CVE-2020-0601
CVE-2020-0609
CVE-2020-0610
CVE-2020-0796
CVE-2020-0938
CVE-2020-1020
CVE-2020-1350
CVE-2020-1472
CVE-2019-0803
CVE-2019-1040
Multiple Vulnerabilities Conext™ Advisor 2 Cloud 2.02 and below
Conext™ Advisor 2 Gateway 1.28.45 and below
Conext™ Control V2 Gateway 2.6 and below
SEVD-2021-285-05 PDF SEVD-2021-285-05 CSAF
2021/10/12 Embedded TCP/IP Stacks Vulnerabilities (AMNESIA:33) in Modicon TM5 modules CVE-2020-13987
CVE-2020-17438
Multiple Vulnerabilities TM5CSLC100FS: safety logic controller Firmware V2.56 and prior
TM5CSLC200FS: safety logic controller Firmware V2.56 and prior
TM5NS31: sercos III communication module Firmware V2.78 and prior
TM5NEIP1: EtherNet/IP module Firmware V3.10 and prior
TM5NEIP1K: EtherNet/IP FieldBus KIT Firmware V3.10 and prior
SEVD-2021-285-06
2021/10/12 Microsoft Remote Desktop Services (DejaBlue) (V5.0) CVE-2019-1181
CVE-2019-1182
CVE-2019-1222
CVE-2019-1223
CVE-2019-1224
CVE-2019-1225
CVE-2019-1226
Multiple Vulnerabilities (Notification Updated) Multiple Products SEVD-2019-267-01 (V5.0)
2021/10/12 Intel Microarchitectural Data Sampling (ZombieLoad) (V6.0) CVE-2018-12126
CVE-2018-12130
CVE-2018-12127
CVE-2019-11091
Multiple Vulnerabilities (Notification Updated) Multiple Products SEVD-2019-193-01 (V6.0)
2021/10/12 Microsoft Remote Desktop Services (BlueKeep) (V7.0) CVE-2019-0708 Remote Code Execution (Notification Updated) Multiple Products SEVD-2019-193-02 (V7.0)
2021/09/14 StruxureWare Data Center Expert CVE-2021-22794
CVE-2021-22795
Multiple Vulnerabilities StruxureWare Data Center Expert versions 7.8.1 and prior. SEVD-2021-257-03 PDF SEVD-2021-257-03 CSAF
2021/09/14 Conext™ ComBox  CVE-2021-22798 CWE-522: Insufficiently Protected Credentials Conext™ ComBox, all versions SEVD-2021-257-04
2021/09/14 Treck TCP/IPv6 Vulnerabilities (V4.0) CVE-2020-27336
CVE-2020-27337
CVE-2020-27338
Multiple Vulnerabilities (Notification Updated) ATV340E Altivar Machine Drives
ATV630/650/660/680/6A0/6B0 Altivar Process Drives
ATV930/950/960/980/9A0/9B0 Altivar Process Drives
VW3A3720, VW3A3721 Altivar Process Communication Modules
APC Network Management Card 2 (NMC2)
APC Network Management Card 3 (NMC3)
IFE Gateway 
Acti9 Smartlink IP* 
Acti9 PowerTag Link / HD* 
Acti9 Smartlink SI D* 
Acti9 Smartlink SI B* 
EGX150/Link150 Ethernet Gateway** 
eIFE Ethernet Interface for MasterPact MTZ drawout circuit breakers
IFE Ethernet Interface for ComPact, PowerPact, and MasterPact circuit breakers
TM3 Bus Coupler EIP
ATV6000 Medium Voltage Altivar Process Drives
SEVD-2020-353-01 (V4.0)
2021/08/10 Harmony/Magelis HMI Products configured by Vijeo Designer, Vijeo Designer Basic and EcoStruxure Machine Expert CVE-2021-22704 CWE-22: Improper Limitation of a Pathname to a Restricted Directory Harmony/HMI Products Configured by Vijeo Designer (all versions prior to V6.2 SP11 )
Vijeo Designer Basic (all versions prior to V1.2), or EcoStruxure Machine Expert (all versions prior to V2.0)
SEVD-2021-222-01
2021/08/10 Pro-face GP-Pro EX CVE-2021-22775 CWE-427: Uncontrolled Search Path Element GP-Pro EX V4.09.250 and prior SEVD-2021-222-03 PDF SEVD-2021-222-03 CSAF
2021/08/10 AccuSine PCSn/PCS+/PFV+ CVE-2021-22793 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor AccuSine PCS+ / PFV+ (Versions prior to V1.6.7) and AccuSine PCSn (Versions prior to V2.2.4) SEVD-2021-222-05 PDF SEVD-2021-222-05 CSAF
2021/08/10 CODESYS V2 Vulnerabilities in Programmable Automation Controller (PacDrive) M CVE-2021-30186
CVE-2021-30188
CVE-2021-30195
Multiple Vulnerabilities Programmable Automation Controller (PacDrive) M, all versions SEVD-2021-222-06 PDF SEVD-2021-222-06 CSAF
2021/08/10 NTZ Mekhanotronika Rus. LLC SHAIIS-MT-111, SHASU-MT-107 and SHFK-MT, and SHFK-MT-104 Control Panels CVE-2021-34527
CVE-2021-1675
Multiple Vulnerabilities SHAIIS-MT-111
SHASU-MT-107 and SHFK-MT and SHFK-MT-104 Control Panels

(see security notification for more details)
SEVD-2021-222-07
2021/08/10  NTZ Mekhanotronika Rus. LLC SHFK-MT-104 Control Panels  CVE-2021-31166 HTTP Protocol Stack Remote Code Execution SHFK-MT-104 Control Panels

(see security notification for more details)
SEVD-2021-222-08
2021/08/10 Embedded Web Server for Modicon X80 BMXNOR0200H RTU Module (V2.0) CVE-2021-22749 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor Modicon X80 BMXNOR0200H RTU SV1.70 IR22 and prior SEVD-2021-159-05 (V2.0)
2021/08/10 Treck HTTP Server Vulnerability on TM3 Bus Coupler Modules (V2.0) CVE-2020-25066 Heap-Based Overflow TM3 Bus Coupler (EIP firmware version 2.1.50.2 and prior)
TM3 Bus Coupler (SL firmware version 2.0.50.2 and prior)
TM3 Bus Coupler (CANOpen firmware version 2.0.50.2 and prior)
SEVD-2020-353-02 (V2.0) PDF SEVD-2020-353-02 (V2.0) CSAF
2021/08/10 Web Server on Modicon M340
Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (V2.0)
CVE-2020-7540 CWE-306: Missing Authentication for Critical Function Modicon M340 CPUs (BMXP34* all versions prior to V3.30)
Modicon M340 Ethernet Communication modules(BMXNOE0100 (H) all versions prior to V3.3, BMXNOE0110 (H) all versions prior to V6.5, BMXNOC0401 (H) all versions prior to V2.10)
Modicon Premium communication modules (TSXETY4103 prior to V6.2, TSXETY5103 prior to V6.4)
Modicon Premium processors with integrated Ethernet COPRO (TSXP574634 versions prior to V6.1, TSXP575634 versions prior to V6.1, TSXP576634 versions prior to V6.1)
Modicon Quantum processors with integrated Ethernet COPRO (140CPU65xx0 prior to V6.1)
Modicon Quantum communication modules (140NOE771x1, prior to V7.1, 140NOC78x00, prior to V1.74, 140NOC77101, prior to V1.08)
BMXNOR200H (all versions)
SEVD-2020-343-04 (V2.0) PDF SEVD-2020-343-04 (V2.0) CSAF
2021/08/10 Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (V2.0) CVE-2020-7539
CVE-2020-7541
Multiple Vulnerabilities Modicon M340 CPUs (BMXP34* versions prior to V3.30)
Modicon M340 Ethernet Communication modules (BMXNOE0100 (H) versions prior to V3.3, BMXNOE0110 (H) versions prior to V6.5, BMXNOC0401 (H) versions prior to V2.10)
Modicon Premium communication modules (TSXETY4103 versions prior to V6.2, TSXETY5103 versions prior to V6.4)
Modicon Premium processors with integrated Ethernet COPRO (TSXP574634 versions prior to V6.1, TSXP575634 versions prior to V6.1, TSXP576634 versions prior to V6.1)
Modicon Quantum processors with integrated Ethernet COPRO (140CPU65xx0 versions prior to V6.1)
Modicon Quantum communication modules (140NOE771x1 versions prior to V7.1, 140NOC78x00 versions prior to V1.74, 140NOC77101 versions prior to V1.08)
SEVD-2020-343-03 (V2.0) PDF SEVD-2020-343-03 (V2.0) CSAF
2021/07/13 Easergy T300 CVE-2021-22769
CVE-2021-22770
CVE-2021-22771
Multiple Vulnerabilities Easergy T300 with firmware V2.7.1 and prior SEVD-2021-194-02
2021/07/13 SoSafe Configurable CVE-2021-22777 CWE-502: Deserialization of Untrusted Data SoSafe Configurable prior to V1.8.1 SEVD-2021-194-03 PDF SEVD-2021-194-03 CSAF
2021/07/13  C-Bus Toolkit  CVE-2021-22784 CWE-287: Improper Authentication C-Bus Toolkit V1.15.8 and prior SEVD-2021-194-04 PDF SEVD-2021-194-04 CSAF
2021/07/13 Easergy T200 CVE-2021-22772 CWE-306: Missing Authentication for Critical Function Easergy T200 (Modbus) SC2-04MOD-07000100 and earlier
Easergy T200 (IEC104) SC2-04IEC-07000100 and earlier
Easergy T200 (DNP3) SC2-04DNP-07000102 and earlier
SEVD-2021-194-05 PDF SEVD-2021-194-05 CSAF
2021/07/13 EVlink City / Parking / Smart Wallbox Charging Stations CVE-2021-22706
CVE-2021-22707
CVE-2021-22708
CVE-2021-22721
CVE-2021-22722
CVE-2021-22723
CVE-2021-22726
CVE-2021-22727
CVE-2021-22728
CVE-2021-22729
CVE-2021-22730
CVE-2021-22773
CVE-2021-22774
Multiple Vulnerabilities All versions prior to R8 V3.4.0.1 of EVlink City (EVC1S22P4 / EVC1S7P4), EVlink Parking (EVW2 / EVF2 / EV.2), and EVlink Smart Wallbox (EVB1A) SEVD-2021-194-06
2021/07/13 APC by Schneider Electric Network Management Cards (Ripple20) (V2.3) CVE-2020-11896
CVE-2020-11897
CVE-2020-11898
CVE-2020-11899
CVE-2020-11900
CVE-2020-11901
CVE-2020-11902
CVE-2020-11903
CVE-2020-11904
CVE-2020-11905
CVE-2020-11906
CVE-2020-11907
CVE-2020-11908
CVE-2020-11909
CVE-2020-11910
CVE-2020-11911
CVE-2020-11912
CVE-2020-11913
CVE-2020-11914
Multiple Vulnerabilities (Notification Updated) APC Network Management Card 1 (NMC1)
APC Network Management Card 2 (NMC2)
APC Network Management Card 3 (NMC3)
SEVD-2020-174-01 (V2.3) PDF SEVD-2020-174-01 (V2.3) CSAF
2021/07/13 EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and RemoteConnect™ (V2.0) CVE-2020-7560 CWE-123 - Write-what-where Condition EcoStruxure Control Expert (versions prior to v15.0 SP1)
Unity Pro (all versions)
EcoStruxure Process Expert (all versions)
RemoteConnect (all versions)
SEVD-2020-343-01 (V2.0) PDF SEVD-2020-343-01 (V2.0) CSAF
2021/07/13 Triconex Models 3009 MP and TCM 4351B (V1.1) CVE-2021-22742
CVE-2021-22743
CVE-2021-22744
CVE-2021-22745
CVE-2021-22746
CVE-2021-22747
Multiple Vulnerabilities Triconex Model 3009 MP and TCM 4351B installed on Tricon v11.3.x systems. SEVD-2021-130-03 (V1.1)
2021/06/08 IGSS (Interactive Graphical SCADA System) CVE-2021-22750
CVE-2021-22751
CVE-2021-22752
CVE-2021-22753
CVE-2021-22754
CVE-2021-22755
CVE-2021-22756
CVE-2021-22757
CVE-2021-22758
CVE-2021-22759
CVE-2021-22760
CVE-2021-22761
CVE-2021-22762
Multiple Vulnerabilities IGSS Definition (Def.exe) V15.0.0.21140 and prior SEVD-2021-159-01 PDF SEVD-2021-159-01 CSAF
2021/06/08 PowerLogic EGX100 and PowerLogicEGX300 CVE-2021-22763
CVE-2021-22764
CVE-2021-22765
CVE-2021-22766
CVE-2021-22767
CVE-2021-22768
Multiple Vulnerabilities EGX100 (All Versions)
EGX100 (Versions 3.0.0 and newer)
EGX300 (All Versions)
SEVD-2021-159-03 PDF SEVD-2021-159-03 CSAF
2021/06/08 Enerlin'X Com’X 510 CVE-2021-22769 CWE-269: Improper Privilege Management Enerlin’X Com’X versions prior to V6.8.4 SEVD-2021-159-06
2021/06/08 EcoStruxure™ Machine Expert and Modicon M218/M241/M251/M262
LMC PacDrive Eco/Pro/Pro2
HMISCU
ATV IMC Logic Controllers
SoMachine/SoMachine Motion
CVE-2020-10245
CVE-2019-13538
CVE-2019-9008
CVE-2019-9009
CVE-2020-7052
Multiple Vulnerabilities (Notification Updated) EcoStruxure™ Machine Expert and Modicon M218/M241/M251/M262
LMC PacDrive Eco/Pro/Pro2
HMISCU
ATV IMC Logic Controllers
SoMachine/SoMachine Motion

(See Security Notification for full version information)
SEVD-2021-130-06 (V2.0)
2021/05/11 Modicon Managed Switch CVE-2021-22731 CWE-640: Weak Password Recovery Mechanism for Forgotten Password Modicon Managed Switch MCSESM* and MCSESP* V8.21 and prior SEVD-2021-130-01 PDF SEVD-2021-130-01 CSAF
2021/05/11 Harmony HMI Products Configured by Vijeo Designer or EcoStruxure Machine Expert CVE-2021-22705 CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer Harmony HMI Products Configured by Vijeo Designer (all versions prior to V6.2 SP11 ) or EcoStruxur Machine Expert (all versions prior to V2.0) SEVD-2021-130-02
2021/05/11 Modicon M241 and M251 Logic Controllers CVE-2021-22699 CWE-20: Improper Input Validation Modicon M241/M251 logic controllers firmware prior to V5.1.9.1 SEVD-2021-130-05 PDF SEVD-2021-130-05 CSAF
2021/05/11 EcoStruxure™ Geo SCADA Expert CVE-2021-22741 CWE-916: Use of Password Hash with Insufficient Computational Effort ClearSCADA (all versions)
EcoStruxure Geo SCADA Expert 2019 (all versions)
EcoStruxure Geo SCADA Expert 2020 (V83.7742.1 and prior)
SEVD-2021-130-07 PDF SEVD-2021-130-07 CSAF
2021/05/11 Modicon Controllers, EcoStruxure™ Control Expert and Unity Pro Programming Software (V3.0) CVE-2020-7475 CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (Notification Updated) EcoStruxure™ Control Expert: all versions prior to V15.0
Unity Pro: all versions
Modicon M340: all versions prior to V3.20
Modicon M580: all versions prior to V3.10
SEVD-2020-080-01 (V3.0) PDF SEVD-2020-080-01 (V3.0) CSAF
2021/04/15 PowerLogic ION8650 / ION8800 / ION7x50 / ION7700/73xx / ION83xx/84xx/85xx/8600 Power Meters CVE-2021-22713 CWE-119: Improper restriction of operations within the bounds of a memory buffer ION8650 / ION8800 / ION7x50 / ION7700/73xx / ION83xx/84xx/85xx/8600 (See notification for affected versions) SEVD-2021-068-03 (V2.0) PDF
2021/04/13 NTZ Mekhanotronika Rus. LLC SHFK-MT-104, SHASU-MT-107 and SHAIIS-MT-111 Control Panels CVE-2019-1040
CVE-2019-0803
Multiple Vulnerabilities SHFK-MT-104
SHASU-MT-107
SHAIIS-MT-111

(See Security Notification for details)
SEVD-2021-103-02
2021/04/13 Schneider Electric Floating License Manager CVE-2019-8960
CVE-2019-8961
Multiple Vulnerabilities (Notification Updated) Schneider Electric Floating License Manager V2.4.0.0 and earlier SEVD-2020-196-02 (V1.3)
2021/03/09 IGSS (Interactive Graphical SCADA System) CVE-2021-22709
CVE-2021-22710
CVE-2021-22711
CVE-2021-22712
Multiple Vulnerabilities IGSS Definition (Def.exe) version 15.0.0.21041 and prior SEVD-2021-068-01 PDF SEVD-2021-068-01 CSAF
2021/03/09 PowerLogic ION7400 / PM8000 / ION9000 Power Meters CVE-2021-22714 CWE-119: Improper restriction of operations within the bounds of a memory buffer All versions prior to V3.0.0 of ION7400, ION9000, and ION8000 SEVD-2021-068-02 PDF SEVD-2021-068-02 CSAF
2021/02/09 PowerLogic Power Metering Products CVE-2021-22701
CVE-2021-22702
CVE-2021-22703
Multiple Vulnerabilities ION7400
ION7x50
ION7700/73xx
ION83xx/84xx/85xx/8600
ION8650
ION8800
ION9000 and PM8000

(see notification for affected versions)
SEVD-2021-040-01 PDF SEVD-2021-040-01 CSAF
2021/01/12 EcoStruxure™ Operator Terminal Expert (Vijeo XD), Pro-face BLUE and WinGP runtime CVE-2020-7544 CWE-269 Improper Privilege Management (Notification Updated) EcoStruxure™ Operator Terminal Expert Runtime 3.1 Service Pack 1A and prior
Pro-face BLUE Runtime 3.1 Service Pack 1A and prior
WinGP V4.09.120

(See security notification for more details)
SEVD-2020-315-02 (V2.0) PDF SEVD-2020-315-02 (V2.0) CSAF
2021/01/12 Modicon M100/M200/M221 Programmable Logic Controllers (V3.0) CVE-2020-7565
CVE-2020-7566
CVE-2020-7567
CVE-2020-7568
CVE-2020-28214
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-311: Missing Encryption of Sensitive Data
CWE-326: Inadequate Encryption Strength
CWE-334: Small Space of Random Values
CWE-760: Use of a One-Way Hash with a Predictable Salt
Modicon M100/M200/M221 (all references) (all versions) SEVD-2020-315-05 (V3.0) PDF SEVD-2020-315-05 (V3.0) CSAF
2020/12/08 EcoStruxure™ Geo SCADA Expert CVE-2020-28219 CWE-522: Insufficiently Protected Credentials EcoStruxure Geo SCADA Expert 2019 (Original release and Monthly Updates to September 2020, from 81.7268.1 to 81.7578.1)
EcoStruxure Geo SCADA Expert 2020 (Original release and Monthly Updates to September 2020, from 83.7551.1 to 83.7578.1)
SEVD-2020-343-02 PDF SEVD-2020-343-02 CSAF
2020/12/08 Modicon M580
Modicon M340
Legacy Controllers Modicon Quantum & Modicon Premium
CVE-2020-7537
CVE-2020-7542
CVE-2020-7543
Multiple Vulnerabilities Modicon M580 CPUs (BMEx58xxxxx prior to version 3.20)
Modicon M340 CPUs (BMX P34x prior to version 3.30)
Modicon Premium CPUs all versions –(SXP574634, TSXP575634, TSXP576634)
Modicon Quantum CPUs all versions (40CPU65xxxxx)
SEVD-2020-343-08 PDF SEVD-2020-343-08 CSAF
2020/12/08 Modicon M258 Logic Controllers and SoMachine/ SoMachine Motion Software CVE-2020-28220 CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer Modicon M258 Firmware (All versions prior to V5.0.4.11)
SoMachine/SoMachine Motion software (All versions)
SEVD-2020-343-09 PDF SEVD-2020-343-09 CSAF
2020/12/08 Easergy T300  CVE-2020-7561
CVE-2020-28215
CVE-2020-28216
CVE-2020-28217
CVE-2020-28218
Multiple Vulnerabilities (Notification Updated) Easergy T300 with firmware 2.7 and older  SEVD-2020-315-06 (V2.0) PDF SEVD-2020-315-06 (V2.0) CSAF
2020/12/08 Wibu-Systems CodeMeter Vulnerabilities CVE-2020-14509
CVE-2020-14513
CVE-2020-14515
CVE-2020-14517
CVE-2020-14519
CVE-2020-16233
Multiple Vulnerabilities EcoStruxure Machine Expert (formerly known as SoMachine and SoMachine Motion)
E+PLC400 - E+PLC100
E+PLC_Setup - EcoStruxure Machine SCADA Expert
SEVD-2020-287-02 (V1.1) PDF SEVD-2020-287-02 (V1.1) CSAF
2020/11/10 Interactive Graphical SCADA System (IGSS) CVE-2020-7550
CVE-2020-7551
CVE-2020-7552
CVE-2020-7553
CVE-2020-7554
CVE-2020-7555
CVE-2020-7556
CVE-2020-7557
CVE-2020-7558
Multiple Vulnerabilities IGSS Definition (Def.exe) version 14.0.0.20247 and prior SEVD-2020-315-03 PDF SEVD-2020-315-03 CSAF
2020/11/10 EcoStruxure Building Operation (EBO) CVE-2020-7569
CVE-2020-7570
CVE-2020-7571
CVE-2020-7572
CVE-2020-7573
CVE-2020-28209
CVE-2020-28210
Multiple Vulnerabilities WebReports V1.9 - V3.1 WebStation (V2.0 - V3.1)
Enterprise Server installer (V1.9 - V3.1)
Enterprise Central installer (V2.0 - V3.1)
SEVD-2020-315-04 PDF SEVD-2020-315-04 CSAF
2020/11/10 Trio Q and J Data Radios - Drovorub malware  Trio Q and J Data Radios  SESB-2020-315-01
2020/11/10 EcoStruxure™ Operator Terminal Expert (Vijeo XD)  CVE-2020-7493
CVE-2020-7494
CVE-2020-7495
CVE-2020-7496
CVE-2020-7497
Multiple Vulnerabilities EcoStruxure™ Operator Terminal Expert 3.1 Service Pack 1 and prior (formerly known as Vijeo XD)  SEVD-2020-133-04 (V3.0)
2020/11/10 Modicon M218/M241/M251/M258 Logic Controllers SoMachine/SoMachine Motion EcoStruxure™ Machine Expert  CVE-2020-7487
CVE-2020-7488
Multiple Vulnerabilities All versions SEVD-2020-105-02 (V1.1) PDF SEVD-2020-105-02 (V1.1) CSAF
2020/10/13 Web Server on Modicon M340
Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules
CVE-2020-7533 CWE-255: Credentials Management M340 CPUs
M340 Communication Ethernet modules
Premium processors with integrated Ethernet COPRO
Premium communication modules
Quantum processors with integrated Ethernet COPRO
Quantum communication modules
SEVD-2020-287-01 PDF SEVD-2020-287-01 CSAF
2020/10/13 Smartlink
PowerTag
Wiser Series Gateways
CVE-2020-7548 CWE-330 - Use of Insufficiently Random Values Acti9 Smartlink SI D all versions prior to 002.004.002
Acti9 Smartlink SI B all versions prior to 002.004.002
Acti9 PowerTag Link / Link HD all versions prior to 001.008.007
Acti9 Smartlink EL B all versions prior to 1.2.1
Wiser Link all versions prior to 1.5.0
Wiser Energy all versions prior to 1.5.0
SEVD-2020-287-03 PDF SEVD-2020-287-03 CSAF
2020/10/13 EcoStruxure™ and SmartStruxure™ Power Monitoring and SCADA Software CVE-2020-7545
CVE-2020-7546
CVE-2020-7547
Multiple Vulnerabilities EcoStruxure™ Power Monitoring Expert versions 9.0, 8.x, 7.x
EcoStruxure™ Energy Expert version 2.0
Power Manager versions 1.1, 1.2, 1.3
StruxureWare™ PowerSCADA Expert with Advanced Reporting and Dashboards Module versions 8.x
EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards Module version 9.0
SEVD-2020-287-04 PDF SEVD-2020-287-04 CSAF
2020/10/13 Netlogon Elevation of Privilege Vulnerability CVE-2020-1472 Multiple Vulnerabilities Elevation of privilege vulnerability SESB-2020-287-01
2020/10/13 Modbus Serial Driver CVE-2020-7523 CWE-269: Improper Privilege Management Schneider Electric Modbus Serial Driver (64 bits) versions prior to V3.20 IE 30
Schneider Electric Modbus Serial Driver (32 bits) versions prior to V2.20 IE 30
Schneider Electric Modbus Driver Suite versions prior to V14.15.0.0
SEVD-2020-224-01 (V1.1) PDF SEVD-2020-224-01 (V1.1) CSAF
2020/10/13 SCADAPack 7x Remote Connect and SCADAPack x70 Security Administrator CVE-2020-7528
CVE-2020-7529
CVE-2020-7530
CVE-2020-7531
CVE-2020-7532
Multiple Vulnerabilities SCADAPack 7x Remote Connect (V3.6.3.574 and prior) and SCADAPack x70 Security Administrator (V1.2.0 and prior) SEVD-2020-252-01 (V2.0) PDF SEVD-2020-252-01 (V2.0) CSAF
2020/08/11 spaceLYnk and Wiser for KNX (formerly homeLYnk) CVE-2020-7525 CWE-307: Improper Restriction of Excessive Authentication Attempts All hardware versions of spaceLYnk and Wiser for KNX (formerly homeLYnk) SEVD-2020-224-02 PDF SEVD-2020-224-02 CSAF
2020/08/11 Modicon M218 Logic Controller CVE-2020-7524 CWE-787:Out-of-bounds Write Modicon M218 Logic Controller V5.0.0.7 and prior SEVD-2020-224-03 PDF SEVD-2020-224-03 CSAF
2020/08/11 APC Easy UPS On-Line Software CVE-2020-7521
CVE-2020-7522
Multiple Vulnerabilities SFAPV9601 - APC Easy UPS On-Line Software V2.0 and earlier SEVD-2020-224-04 PDF SEVD-2020-224-04 CSAF
2020/08/11 PowerChute Business Edition CVE-2020-7526 CWE-20: Improper Input Validation PowerChute Business Edition software V9.0.x and earlier SEVD-2020-224-05 PDF SEVD-2020-224-05 CSAF
2020/08/11 Harmony® eXLhoist CVE-2019-19193 Bluetooth Low Energy Vulnerability (SweynTooth) Harmony® eXLhoist base stations v04.00.02.00 and prior  SEVD-2020-224-06 PDF SEVD-2020-224-06 CSAF
2020/08/11 SoMove CVE-2020-7527 CWE-276: Incorrect Default Permission SoMove V2.8.1 and prior SEVD-2020-224-07 PDF SEVD-2020-224-07 CSAF
2020/08/11 Schneider Electric PACTware CVE-2020-9403
CVE-2020-9404
Multiple Vulnerabilities Schneider Electric PACTware V5.0.5.30 and prior.
Schneider Electric PACTware V4.1 SP5 and prior.
SEVD-2020-224-08 PDF SEVD-2020-224-08 CSAF
2020/08/11 Vijeo Designer and Vijeo Designer Basic CVE-2020-7501 CWE-798: Use of Hard-coded Credentials  Vijeo Designer Basic V1.1 HotFix 16 and prior 
Vijeo Designer V6.9 SP9 and prior 
SEVD-2020-133-02 (V1.1) PDF SEVD-2020-133-02 (V1.1) CSAF
2020/08/11 Vijeo Designer and Vijeo Designer Basic  CVE-2020-7490  CWE-426: Untrusted Search Path  Vijeo Designer Basic (V1.1 HotFix 15 and prior) and Vijeo Designer (V6.2 SP9 and prior) SEVD-2020-105-03 (V1.2) PDF SEVD-2020-105-03 (V1.2) CSAF
2020/07/14 Schneider Electric Software Update (SESU) CVE-2020-7520 CWE-601: URL Redirection to Untrusted Site ('Open Redirect') SESU V2.4.0 and earlier SEVD-2020-196-01 PDF SEVD-2020-196-01 CSAF
2020/06/23 Security Bulletin: Treck TCP/IP Vulnerabilities (Ripple20) CVE-2020-11896
CVE-2020-11897
CVE-2020-11898
CVE-2020-11899
CVE-2020-11900
CVE-2020-11901
CVE-2020-11902
CVE-2020-11903
CVE-2020-11904
CVE-2020-11905
CVE-2020-11906
CVE-2020-11907
CVE-2020-11908
CVE-2020-11909
CVE-2020-11910
CVE-2020-11911
CVE-2020-11912
CVE-2020-11913
CVE-2020-11914
Multiple Vulnerabilities See Security Bulletin SESB-2020-168-01 (V2.0)
2020/06/23 Legacy Triconex Product Vulnerabilities CVE-2020-7483
CVE-2020-7484
CVE-2020-7485
CVE-2020-7486
CVE-2020-7491
Multiple Vulnerabilities See Security Bulletin SESB-2020-105-01 (V2.1)
2020/06/09 Modicon M218 Logic Controller CVE-2020-7502 CWE-787: Out-of-bounds Write Vulnerability Modicon M218 firmware version 4.3 and prior SEVD-2020-161-01 PDF SEVD-2020-161-01 CSAF
2020/06/09 Unity Loader and OS Loader Software CVE-2020-7498 CWE-798: Use of Hard-coded Credentials  Unity Loader - All versions
OS Loader - All versions (used for legacy Modicon offers)
SEVD-2020-161-02
2020/06/09 Modicon LMC078 Logic Controller CVE-2020-10664 NULL Pointer Dereference  Modicon LMC Logic Controller running with firmware version V1.51.15.05 and later SEVD-2020-161-03 PDF SEVD-2020-161-03 CSAF
2020/06/09 Easergy T300 CVE-2020-7503
CVE-2020-7504
CVE-2020-7505
CVE-2020-7506
CVE-2020-7507
CVE-2020-7508
CVE-2020-7509
CVE-2020-7510
CVE-2020-7511
CVE-2020-7512
CVE-2020-7513
Multiple Vulnerabilities Easergy T300 with firmware 1.5.2. and older SEVD-2020-161-04 PDF SEVD-2020-161-04 CSAF
2020/06/09 Easergy Builder CVE-2020-7514
CVE-2020-7515
CVE-2020-7516
CVE-2020-7517
CVE-2020-7518
CVE-2020-7519
Multiple Vulnerabilities Easergy Builder version 1.4.7.2 and older SEVD-2020-161-05 PDF SEVD-2020-161-05 CSAF
2020/06/09 GoAhead Web Server CVE-2015-7937 Stack-based buffer overflow  BMXNOC0401 (all versions prior to v2.09)
BMXNOE0100 (all versions prior to v3.10)
BMXNOE0100H (all versions prior to v3.10)
BMXNOE0110 (all versions prior to v6.30)
BMXNOE0110H (all versions prior to v6.30)
BMXNOR0200 (all versions prior to v1.70)
BMXNOR0200H (all versions prior to v1.70)
BMXP342020 (all versions prior to v2.80)
BMXP342020H (all versions prior to v2.80)
BMXP342030 (all versions prior to v2.80)
BMXP3420302 (all versions prior to v2.80)
BMXP3420302H (all versions prior to v2.80)
BMXPRA0100 (all versions prior to v2.80) 
SEVD-2015-344-01 (V2.0) PDF SEVD-2015-344-01 (V2.0) CSAF
2020/05/12 Pro-face GP-Pro EX Programming Software CVE-2020-7492 CWE-521: Weak Password Requirements  GP-Pro EX V1.00 to V4.09.100 SEVD-2020-133-01
2020/05/12 U.motion Servers and Touch Panels CVE-2020-7499
CVE-2020-7500
Multiple Vulnerabilities  All versions of: MTN6501-0001 – U.Motion – KNX Server, MTN6501-0002 – U.Motion – KNX Server Plus
MTN6260-0410 – U.Motion KNX server Plus, Touch 10
MTN6260-0415 – U.Motion KNX server Plus, Touch 15
MTN6260-0310 – U.Motion KNX Client Touch 10
MTN6260-0315 – U.Motion KNX Client Touch 15 
SEVD-2020-133-03 PDF SEVD-2020-133-03 CSAF
2020/05/12 Andover Continuum System CVE-2020-7480
CVE-2020-7481
CVE-2020-7482
Multiple Vulnerabilities All Continuum versions are affected SEVD-2020-070-04 (V2.1) PDF SEVD-2020-070-04 (V2.1) CSAF
2020/05/12 Embedded Web Servers for Modicon CVE-2018-7804
CVE-2018-7809
CVE-2018-7810
CVE-2018-7811
CVE-2018-7812
CVE-2018-7830
CVE-2018-7831
CVE-2018-7833
Multiple Vulnerabilities All Modicon M340, Premium
Quantum PLCs
BMXNOR0200 controllers
SESB-2018-327-01 (V3.2)
2020/04/14 Modicon M100/M200/M221 controllers
SoMachine Basic and EcoStruxure Machine Expert - Basic Programming Software 
CVE-2020-7489  CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')  All versions SEVD-2020-105-01 PDF SEVD-2020-105-01 CSAF
2020/04/14 Modicon Controllers, EcoStruxure™Control Expert and Unity Pro Programming Software CVE-2019-6855  CWE-285  Improper Authorization EcoStruxure™ Control Expert: all versions prior to 14.1 Hot Fix
Unity Pro: all versions, Modicon M340: all versions prior to V3.20
Modicon M580: all versions prior to V3.10
SEVD-2019-344-02 (V2.0)
2020/03/10 IGSS (Interactive Graphical SCADA System) CVE-2020-7478
CVE-2020-7479
Multiple Vulnerabilities Versions 14 and prior using the service: IGSSupdate. SEVD-2020-070-01 PDF SEVD-2020-070-01 CSAF
2020/03/10 Modicon Quantum Ethernet Network module and Quantum / Premium COPRO CVE-2020-7477 CWE-754: Improper Check for Unusual or Exception Conditions Quantum Ethernet Network module 140NOE771x1, versions 7.0 and prior
Quantum processors with integrated Ethernet – 140CPU65xxxxx, all versions
Premium processors with integrated Ethernet, all versions
SEVD-2020-070-02 PDF SEVD-2020-070-02 CSAF
2020/03/10 ZigBee Installation Toolkit CVE-2020-7476 CWE-426: Untrusted Search Path Versions prior to 1.0.1 SEVD-2020-070-03 PDF SEVD-2020-070-03 CSAF
2020/02/11 ProSoft Configurator for Modicon PMEPXM0100 (H) CVE-2020-7474 CWE-427: Uncontrolled Search Path Element ProSoft Configurator v1.002 and prior, for the PMEPXM0100 (H) module SEVD-2020-042-01 PDF SEVD-2020-042-01 CSAF
2020/02/11 U.motion Builder Software CVE-2018-7763
CVE-2018-7764
CVE-2018-7765
CVE-2018-7766
CVE-2018-7767
CVE-2018-7768
CVE-2018-7769
CVE-2018-7770
CVE-2018-7771
CVE-2018-7772
CVE-2018-7773
CVE-2018-7774
CVE-2018-7776
CVE-2018-7777
CVE-2018-7494
Security Notification Updated All versions prior to v1.3.4 SEVD-2018-095-01 (V1.2) PDF SEVD-2018-095-01 (V1.2) CSAF
2020/01/28 EcoStruxure™ Operator Terminal Expert - Security Bulletin EcoStruxure™ Operator Terminal Expert software  SESB-2020-028-01
2020/01/14 MSX Configurator CVE-2019-6858 CWE-427:Uncontrolled Search Path Element Software Version prior to V1.0.8.1 SEVD-2020-014-01 PDF SEVD-2020-014-01 CSAF
Employee working at a control room with many screens in front

See all archived security notifications

See all

Need help?

Start here!

Find answers now. Search for a solution on your own, or connect with one of our experts.

Contact Support

Reach out to our customer care team to receive more information, technical support, assistance with complaints and more.

Where to buy?

Easily find the nearest Schneider Electric distributor in your location.

Browse FAQ

Get answers you need by browsing topic-related Frequently Asked Questions (FAQ).

Contact Sales

Start your sales inquiry online and an expert will connect with you.

Your browser is out of date and has known security issues.

It also may not display all features of this website or other websites.

Please upgrade your browser to access all of the features of this website.

Latest version for Google Chrome, Mozilla Firefox or Microsoft Edgeis recommended for optimal functionality.