schneider-electric security advisories
11 threat alerts tracking vulnerabilities and security advisories that affect schneider-electric products.
Vulnios monitors schneider-electric CVE feeds, vendor advisories, CISA KEV listings, and exploit-prediction data continuously. Each alert below is enriched with severity, exploitation status, affected products, and a remediation path. Use this page to scan recent schneider-electric security news in one place, or click into an individual alert for full detail.
Critical Vulnerability: CVE-2017-9629 — schneider-electric — wonderware_archestra_logger
A Stack-Based Buffer Overflow issue was discovered in Schneider Electric Wonderware ArchestrA Logger, versions 2017.426.2307.1 and prior. The stack-based buffer overflow vulnerability has been identif
criticalCVE-2017-9629Critical Vulnerability: CVE-2017-6034 — schneider-electric — modbus_firmware, modbus
An Authentication Bypass by Capture-Replay issue was discovered in Schneider Electric Modicon Modbus Protocol. Sensitive information is transmitted in cleartext in the Modicon Modbus protocol, which m
criticalCVE-2017-6034Critical Vulnerability: CVE-2017-6028 — schneider-electric — modicon_m241_firmware, modicon_m241
An Insufficiently Protected Credentials issue was discovered in Schneider Electric Modicon PLCs Modicon M241, all firmware versions, and Modicon M251, all firmware versions. Log-in credentials are sen
criticalCVE-2017-6028Critical Vulnerability: CVE-2017-6026 — schneider-electric — modicon_m251_firmware, modicon_m251
A Use of Insufficiently Random Values issue was discovered in Schneider Electric Modicon PLCs Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Ve
criticalCVE-2017-6026Critical Vulnerability: CVE-2017-7689 — schneider-electric — homelynk_controller_lss100100_firmware, homelynk_controller_lss100100
A Command Injection vulnerability in Schneider Electric homeLYnk Controller exists in all versions before 1.5.0.
criticalCVE-2017-7689Critical Vulnerability: CVE-2017-7574 — schneider-electric — modicon_tm221ce16r_firmware, modicon_tm221ce16r
Schneider Electric SoMachine Basic 1.4 SP1 and Schneider Electric Modicon TM221CE16R 1.3.3.3 devices have a hardcoded-key vulnerability. The Project Protection feature is used to prevent unauthorized
criticalCVE-2017-7574Critical Vulnerability: CVE-2017-7575 — schneider-electric — modicon_tm221ce16r_firmware, modicon_tm221ce16r
Schneider Electric Modicon TM221CE16R 1.3.3.3 devices allow remote attackers to discover the application-protection password via a \x00\x01\x00\x00\x00\x05\x01\x5a\x00\x03\x00 request to the Modbus po
criticalCVE-2017-7575Critical Vulnerability: CVE-2017-5178 — schneider-electric — tableau_desktop, tableau_server
An issue was discovered in Schneider Electric Tableau Server/Desktop Versions 7.0 to 10.1.3 in Wonderware Intelligence Versions 2014R3 and prior. These versions contain a system account that is instal
criticalCVE-2017-5178Critical Vulnerability: CVE-2016-5818 — schneider-electric — powerlogic_pm8ecc_firmware, powerlogic_pm8ecc
An issue was discovered in Schneider Electric PowerLogic PM8ECC device 2.651 and older. Undocumented hard-coded credentials allow access to the device.
criticalCVE-2016-5818Critical Vulnerability: CVE-2016-5815 — schneider-electric — ion5000, ion7300
An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX series, ION76XX series, ION8650 series, ION8800 series, and PM5XXX series. No authentication is config
criticalCVE-2016-5815Critical Vulnerability: CVE-2016-8352 — schneider-electric — connexium_firmware, tcsefec23f3f20
An issue was discovered in Schneider Electric ConneXium firewalls TCSEFEC23F3F20 all versions, TCSEFEC23F3F21 all versions, TCSEFEC23FCF20 all versions, TCSEFEC23FCF21 all versions, and TCSEFEC2CF3F20
criticalCVE-2016-8352
Track schneider-electric exposure across your environment
Vulnios automatically cross-references your asset inventory against new schneider-electric CVEs and surfaces only what affects you. No more sifting manually — actionable findings only.
Start a free scan