Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Schneider Electric: Vulnerabilities discovered in various products (AL07/250114/CSIRT-ITA)

Schneider Electric: Vulnerabilities discovered in various products (AL07/250114/CSIRT-ITA)

Summary

New vulnerabilities detected in some Schneider Electric products – which can also be integrated into SCADA solutions – six of which are “high” severity.

Risk

Vulnerability Community Impact Estimate: High (65.12)

Type

  • Remote Code Execution
  • Denial of Service
  • Security Restrictions Bypass
  • Elevation of Privilege
  • Information Disclosure

Affected Products and/or Versions

Schneider Electric

  • Modicon M580 CPU
  • Modicon M580 CPU Safety
  • BMENOR2200H
  • BMXNOE0100
  • BMXNOE0110
  • BMXNOR0200H
  • EVLink Pro AC
  • Pro-face GP-Pro EX
  • Pro-face Remote HMI
  • Web Designer
  • Modicon M340 processors
  • RemoteConnect and SCADAPackTM x70 Utilities
  • PowerLogic HDPM6000

Mitigation Actions

In line with vendor statements, it is recommended to apply the available mitigations following the indications reported in the security bulletins in the References section.

The following are the CVEs related to the vulnerabilities with a severity of “high”:

CVE
CVE-2024-10497
CVE-2024-11425
CVE-2024-12142
CVE-2024-12399
CVE-2024-12476
CVE-2024-12703

References

https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp: apre un link esterno

https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-014-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-014-01.pdf: apre un link esterno

https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-014-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-014-02.pdf: apre un link esterno

https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-014-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-014-04.pdf: apre un link esterno

https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-014-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-014-05.pdf: apre un link esterno

https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-014-06&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-014-06.pdf: apre un link esterno

https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-014-08&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-014-08.pdf

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services