SEVD-2021-313-05
Vulnerability from csaf_se - Published: 2021-11-09 05:00 - Updated: 2025-09-09 04:00Summary
BadAlloc Vulnerabilities
Notes
General Security Recommendations
We strongly recommend the following industry cybersecurity best practices.
* Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.
* Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.
* Place all controllers in locked cabinets and never leave them in the “Program” mode.
* Never connect programming software to any network other than the network intended for that device.
* Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks.
* Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation.
* Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.
* When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices.
For more information refer to the Schneider Electric [Recommended Cybersecurity Best Practices](https://www.se.com/us/en/download/document/7EN52-0390/) document.
For More Information
This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, contact your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process.
For further information related to cybersecurity in Schneider Electric's products, visit the company's cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp
LEGAL DISCLAIMER
THIS NOTIFICATION DOCUMENT, THE INFORMATION CONTAINED HEREIN, AND ANY MATERIALS LINKED FROM IT (COLLECTIVELY, THIS “NOTIFICATION”) ARE INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN “AS-IS” BASIS WITHOUT WARRANTY OR GUARANTEE OF ANY KIND. SCHNEIDER ELECTRIC DISCLAIMS ALL WARRANTIES RELATING TO THIS NOTIFICATION, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SCHNEIDER ELECTRIC MAKES NO WARRANTY THAT THE NOTIFICATION WILL RESOLVE THE IDENTIFIED SITUATION. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES OR LOSSES WHATSOEVER IN CONNECTION WITH THIS NOTIFICATION, INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF THIS NOTIFICATION IS AT YOUR OWN RISK, AND YOU ARE SOLELY LIABLE FOR ANY DAMAGES TO YOUR SYSTEMS OR ASSETS OR OTHER LOSSES THAT MAY RESULT FROM YOUR USE OF THIS NOTIFICATION. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION
About Schneider Electric
Schneider's purpose is to create Impact by empowering all to make the most of our energy and resources, bridging progress and
sustainability for all. We call this Life Is On.
Our mission is to be the trusted partner in Sustainability and Efficiency.
We are a global industrial technology leader bringing world-leading expertise in electrification, automation and digitization to smart
industries, resilient infrastructure, future-proof data centers, intelligent buildings, and intuitive homes. Anchored by our deep
domain expertise, we provide integrated end-to-end lifecycle AI enabled Industrial IoT solutions with connected products, automation,
software and services, delivering digital twins to enable profitable growth for our customers.
We are a people company with an ecosystem of 150,000 colleagues and more than a million partners operating in over 100 countries
to ensure proximity to our customers and stakeholders. We embrace diversity and inclusion in everything we do, guided by our
meaningful purpose of a sustainable future for all.
www.se.com
Overview
Schneider Electric is aware of multiple memory allocation vulnerabilities dubbed 'BadAlloc', disclosed by
Microsoft on April 29, 2021. The impact of a successful exploitation of the vulnerabilities may result in denial of
service, or remote code execution, depending on the context.
September 2025 Update: Corrected and updated affected versions for EPC2000, EPC3000, Eurotherm E+PLC400, Eurotherm Eycon 10/20 Visual Supervisor, Eurotherm T2550 PAC, and Eurotherm T2750 PAC.
Vulnerability Details
The complete list of affected real-time operating systems can be found here: https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04
Affected Products, Remediations & Mitigations
Schneider Electric has determined that the following offers are impacted and has provided remediations, for
those listed in the Available Remediations section, and recommended mitigations, for those in the Affected
Products section.
Please subscribe to the Schneider Electric security notification service to be informed of critical updates to this
notification, including information on affected products and remediation plans:
https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "We strongly recommend the following industry cybersecurity best practices.\n\n* Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\n* Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\n* Place all controllers in locked cabinets and never leave them in the \u201cProgram\u201d mode.\n* Never connect programming software to any network other than the network intended for that device.\n* Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks.\n* Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation.\n* Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\n* When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices.\n\nFor more information refer to the Schneider Electric [Recommended Cybersecurity Best Practices](https://www.se.com/us/en/download/document/7EN52-0390/) document.",
"title": "General Security Recommendations"
},
{
"category": "general",
"text": "This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, contact your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process.\n\nFor further information related to cybersecurity in Schneider Electric\u0027s products, visit the company\u0027s cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp",
"title": "For More Information"
},
{
"category": "legal_disclaimer",
"text": "THIS NOTIFICATION DOCUMENT, THE INFORMATION CONTAINED HEREIN, AND ANY MATERIALS LINKED FROM IT (COLLECTIVELY, THIS \u201cNOTIFICATION\u201d) ARE INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN \u201cAS-IS\u201d BASIS WITHOUT WARRANTY OR GUARANTEE OF ANY KIND. SCHNEIDER ELECTRIC DISCLAIMS ALL WARRANTIES RELATING TO THIS NOTIFICATION, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SCHNEIDER ELECTRIC MAKES NO WARRANTY THAT THE NOTIFICATION WILL RESOLVE THE IDENTIFIED SITUATION. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES OR LOSSES WHATSOEVER IN CONNECTION WITH THIS NOTIFICATION, INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF THIS NOTIFICATION IS AT YOUR OWN RISK, AND YOU ARE SOLELY LIABLE FOR ANY DAMAGES TO YOUR SYSTEMS OR ASSETS OR OTHER LOSSES THAT MAY RESULT FROM YOUR USE OF THIS NOTIFICATION. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION",
"title": "LEGAL DISCLAIMER"
},
{
"category": "general",
"text": "Schneider\u0027s purpose is to create Impact by empowering all to make the most of our energy and resources, bridging progress and\r\nsustainability for all. We call this Life Is On.\n\nOur mission is to be the trusted partner in Sustainability and Efficiency.\n\nWe are a global industrial technology leader bringing world-leading expertise in electrification, automation and digitization to smart\r\nindustries, resilient infrastructure, future-proof data centers, intelligent buildings, and intuitive homes. Anchored by our deep\r\ndomain expertise, we provide integrated end-to-end lifecycle AI enabled Industrial IoT solutions with connected products, automation,\r\nsoftware and services, delivering digital twins to enable profitable growth for our customers.\n\nWe are a people company with an ecosystem of 150,000 colleagues and more than a million partners operating in over 100 countries\r\nto ensure proximity to our customers and stakeholders. We embrace diversity and inclusion in everything we do, guided by our\r\nmeaningful purpose of a sustainable future for all. \n\n www.se.com",
"title": "About Schneider Electric"
},
{
"category": "summary",
"text": "Schneider Electric is aware of multiple memory allocation vulnerabilities dubbed \u0027BadAlloc\u0027, disclosed by \nMicrosoft on April 29, 2021. The impact of a successful exploitation of the vulnerabilities may result in denial of \nservice, or remote code execution, depending on the context. \n\nSeptember 2025 Update: Corrected and updated affected versions for EPC2000, EPC3000, Eurotherm E+PLC400, Eurotherm Eycon 10/20 Visual Supervisor, Eurotherm T2550 PAC, and Eurotherm T2750 PAC.",
"title": "Overview"
},
{
"category": "details",
"text": "The complete list of affected real-time operating systems can be found here: https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04",
"title": "Vulnerability Details"
},
{
"category": "other",
"text": "Schneider Electric has determined that the following offers are impacted and has provided remediations, for \nthose listed in the Available Remediations section, and recommended mitigations, for those in the Affected \nProducts section. \nPlease subscribe to the Schneider Electric security notification service to be informed of critical updates to this \nnotification, including information on affected products and remediation plans:\nhttps://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp",
"title": "Affected Products, Remediations \u0026 Mitigations"
}
],
"publisher": {
"category": "vendor",
"contact_details": "cpcert@se.com",
"name": "Schneider Electric CPCERT",
"namespace": "https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp"
},
"references": [
{
"category": "self",
"summary": "BadAlloc Vulnerabilities - SEVD-2021-313-05 CSAF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-05\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=sevd-2021-313-05.json"
},
{
"category": "self",
"summary": "BadAlloc Vulnerabilities - SEVD-2021-313-05 PDF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-05\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-313-05_BadAlloc_Vulnerabilities_Security_Notification.pdf"
},
{
"category": "external",
"summary": "Recommended Cybersecurity Best Practices",
"url": "https://www.se.com/us/en/download/document/7EN52-0390/"
}
],
"title": "BadAlloc Vulnerabilities",
"tracking": {
"current_release_date": "2025-09-09T04:00:00.000Z",
"generator": {
"date": "2025-09-02T06:36:57.616Z",
"engine": {
"name": "Schneider Electric CSAF Generator",
"version": "1.2"
}
},
"id": "SEVD-2021-313-05",
"initial_release_date": "2021-11-09T05:00:00.000Z",
"revision_history": [
{
"date": "2021-11-09T05:00:00.000Z",
"number": "1.0.0",
"summary": "Original Release"
},
{
"date": "2021-11-17T06:30:00.000Z",
"number": "1.1.0",
"summary": "Fixed version number of PacDrive Eco/Pro/Pro2 Logic Controllers \ncorrected to v1.66.5.1."
},
{
"date": "2021-12-14T06:30:00.000Z",
"number": "2.0.0",
"summary": "Remediations added for SCD6000 Industrial RTU, PowerLogic \nION7400, PowerLogic ION8000, PowerLogic ION9000. Upon further \ninvestigation Tricon Communication Modules have been removed from \nlist of affected products and are not impacted by the Badalloc \nVulnerabilities."
},
{
"date": "2021-12-15T06:30:00.000Z",
"number": "3.0.0",
"summary": "Remediations added for PowerLogic ION9000."
},
{
"date": "2022-01-11T06:30:00.000Z",
"number": "4.0.0",
"summary": "Remediations added for Easergy P5, EPC3000, Harmony/ Magelis \nHMIGTU Series, HMIGTUX Series, HMIGK Series, nanodac, Pro-face \nSP-5B00, SP-5B10,SP-5B90,ST6000 Series (GP-ProEX model), \nET6000 Series in the Available Remediations section (page 1, 2, 4, and \n6). Updated versions affected to all versions for Pro-face GP4000 \nSeries, LT4000M Series, GP4000H Series in the Affected Versions\nsection. "
},
{
"date": "2022-01-13T06:30:00.000Z",
"number": "4.1.0",
"summary": "Moved back to affected products section: Harmony/ Magelis HMIGTU \nSeries, HMIGTUX Series, HMIGK Series. "
},
{
"date": "2022-02-08T06:30:00.000Z",
"number": "5.0.0",
"summary": "Available remediations for Easy Harmony ET6 (HMIET Series), Easy \nHarmony GXU (HMIGXU Series), Harmony/ Magelis (HMIGTU Series, \nHMIGTUX Series, HMIGK Series), Modicon M262 Logic Controllers, \nand Modicon M241/M251 Logic Controllers. Added Easergy MiCOM \nP30 and Easergy MiCOM P40 to the list of affected products."
},
{
"date": "2022-04-12T06:30:00.000Z",
"number": "6.0.0",
"summary": "Added remediations for Eurotherm E+PLC400, Eurotherm T2750 PAC \nand Modicon M340 CPU. Additionally, Eurotherm T2550 PAC and \nEurotherm Eycon 10/20 Visual Supervisor have been added as affected \nproducts to this security notification in the remediation section."
},
{
"date": "2022-05-10T00:00:00.000Z",
"number": "7.0.0",
"summary": "Added a remediation for HMISCU, added the following affected models \nto the Easergy MiCOM P30 range: C434, P132, P139, P433, P435, \nP437, P532, P631, P632, P633, P634, Px36/8."
},
{
"date": "2022-06-13T18:30:00.000Z",
"number": "8.0.0",
"summary": "Added a remediation for EPC2000, v4.03 includes a fix. "
},
{
"date": "2022-06-14T18:30:00.000Z",
"number": "9.0.0",
"summary": "Remediation added for Versadac. The previously added remediation for \nEPC2000 has been removed as v4.03 is not yet available, this \ndocument will be updated when it is released."
},
{
"date": "2022-08-09T06:30:00.000Z",
"number": "10.0.0",
"summary": "Remediations available for Modicon M580 CPU (BMEP* and BMEH*)\nand Pro-face GP4000 Series, GP4000H Series GP-Pro EX. "
},
{
"date": "2022-09-13T06:30:00.000Z",
"number": "11.0.0",
"summary": "Final Remediations available for Modicon M340 Modules \nBMXNOC0401 and BMXNOR0200H RTU, and Modicon MC80 \nController (BMKC8*). There is a mitigation available for Profibus \nRemote Master (TCSEGPA23F14F) and CANopen X80 \nCommunication Module (BMECXM0100)."
},
{
"date": "2022-10-11T00:00:00.000Z",
"number": "12.0.0",
"summary": "Easergy MiCOM P30 range P632 and P633 were added as affected \nmodels along with a remediation. Final mitigations were added for \nModicon Momentum ENT. Adding a clarification to the list of affected \nproducts by splitting Modicon M580 and Modicon M580 Safety CPU \nranges; the latest fix Modicon M580 v4.02 does not apply to the Safety \nrange of M580."
},
{
"date": "2022-11-08T00:00:00.000Z",
"number": "13.0.0",
"summary": "A remediation is now available for EPC2000."
},
{
"date": "2022-12-13T00:00:00.000Z",
"number": "14.0.0",
"summary": "The Modicon M580 SV4.02 firmware has been retracted for quality \nissues and is no longer available for download. Additional mitigations \nhave been introduced for Modicon M580 CPU and M580 CPU Safety, \nand we urge customers to deploy these mitigations to further reduce \nthe risk of potential exploitation of identified vulnerabilities."
},
{
"date": "2023-01-10T00:00:00.000Z",
"number": "15.0.0",
"summary": "There are remediations available for Easergy MiCOM P30 range and\nPro-face LT4000M Series. "
},
{
"date": "2023-02-14T00:00:00.000Z",
"number": "16.0.0",
"summary": "There is a remediation for Modicon M340 Ethernet Communication \nModules BMXNOE0100 (H) and BMXNOE0110 (H) products."
},
{
"date": "2023-03-14T06:30:00.000Z",
"number": "17.0.0",
"summary": "Remediations for the following products are now available: Easergy \nMiCOM P30 range models P139, P437, P439, P532, P631, P632, \nP633, P634, C434 (page 2), Modicon M580 CPU part numbers BMEP* \nand BMEH (page 7), and Modicon Momentum Unity M1E Processor \npart numbers 171CBU* (page 8). Mitigations for Easergy MiCOM P30 \nrange, models P138, P436, P438, P132, P433, P435 have been added."
},
{
"date": "2023-04-11T06:30:00.000Z",
"number": "18.0.0",
"summary": "Remediations are now available for Modicon M580 Ethernet \nCommunication Modules BMENOC*."
},
{
"date": "2023-05-09T06:30:00.000Z",
"number": "19.0.0",
"summary": "A remediation is now available for Modicon X80 Module (part number \nBMXNOM0200)."
},
{
"date": "2023-07-11T00:00:00.000Z",
"number": "20.0.0",
"summary": "A remediation is now available for HART IO X80 Module (part number \nBMEAHI0812, BMEAHO0412)."
},
{
"date": "2024-03-12T00:00:00.000Z",
"number": "21.0.0",
"summary": "Easergy MiCOM P30 range models 139 and 436 were added to \nAffected Products."
},
{
"date": "2024-08-13T00:00:00.000Z",
"number": "22.0.0",
"summary": "A remediation is available on Modicon M580 CPU Safety."
},
{
"date": "2024-09-10T00:00:00.000Z",
"number": "23.0.0",
"summary": "A remediation is available on HMISTU (page 4)."
},
{
"date": "2024-11-12T00:00:00.000Z",
"number": "24.0.0",
"summary": "Changes have been made to the Easergy MiCOM P30 remediation \ndescription and we have added model P638 to the list of Easergy \nMiCOM P30s with a remediation."
},
{
"date": "2025-01-14T00:00:00.000Z",
"number": "25.0.0",
"summary": "A remediation is available for Modicon X80 module, part number \nBMENOS0300 (Page 10)."
},
{
"date": "2025-04-08T04:00:00.000Z",
"number": "26.0.0",
"summary": "A remediation is available for BMECRA31210, BMXCRA31200, \nBMXCRA31210 (Page 13) and mitigations for this product have been \nupdated. "
},
{
"date": "2025-08-12T04:00:00.000Z",
"number": "27.0.0",
"summary": "Remediations are available for 140CRA31200 (Quantum RIO Drop), \n140CRA31908 (M580 Quantum S908 RIO Drop Adapter) (Page 13), \nand BMENOP0300 (Page 14)."
},
{
"date": "2025-09-09T04:00:00.000Z",
"number": "28.0.0",
"summary": "Corrected and updated affected versions for EPC2000, EPC3000, Eurotherm E+PLC400, Eurotherm Eycon 10/20 Visual Supervisor, Eurotherm T2550 PAC, and Eurotherm T2750 PAC."
}
],
"status": "final",
"version": "28.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.0.5",
"product": {
"name": "Schneider Electric Easergy C5x Versions prior to 1.0.5",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"C52",
"C53"
]
}
}
},
{
"category": "product_version",
"name": "1.0.5",
"product": {
"name": "Schneider Electric Easergy C5x Version 1.0.5",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "Easergy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=660|\u003c=674",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 v660 to v674",
"product_id": "3",
"product_identification_helper": {
"model_numbers": [
"P138",
"P139",
"P436",
"P437",
"P438",
"P439",
"P532",
"P631",
"P632",
"P633",
"P634",
"C434"
]
}
}
},
{
"category": "product_version_range",
"name": "\u003e=675",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 Version 675 and later",
"product_id": "4"
}
},
{
"category": "product_version_range",
"name": "\u003e=660|\u003c=674",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 v660 to v674",
"product_id": "5",
"product_identification_helper": {
"model_numbers": [
"P638"
]
}
}
},
{
"category": "product_version",
"name": "676.701",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 Version 676.701",
"product_id": "6",
"product_identification_helper": {
"model_numbers": [
"P638"
]
}
}
},
{
"category": "product_version_range",
"name": "\u003e=660|\u003c=674",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 v660 to v674",
"product_id": "7",
"product_identification_helper": {
"model_numbers": [
"P132",
"P433",
"P435"
]
}
}
},
{
"category": "product_version_range",
"name": "\u003e=660|\u003c=674",
"product": {
"name": "Schneider Electric Easergy MiCOM P30 v660 to v674",
"product_id": "188",
"product_identification_helper": {
"model_numbers": [
"Px36",
"Px38"
]
}
}
}
],
"category": "product_name",
"name": "Easergy MiCOM P30"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c01.401.101",
"product": {
"name": "Schneider Electric Easergy P5 Versions prior to 01.401.101",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "01.401.101",
"product": {
"name": "Schneider Electric Easergy P5 Version 01.401.101",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "Easergy P5"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.03",
"product": {
"name": "Schneider Electric Eurotherm EPC2000 Versions prior to v4.03",
"product_id": "10"
}
},
{
"category": "product_version",
"name": "4.03",
"product": {
"name": "Schneider Electric Eurotherm EPC2000 Version 4.03",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "EPC2000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.20",
"product": {
"name": "Schneider Electric Eurotherm EPC3000 Versions prior to v5.20",
"product_id": "12"
}
},
{
"category": "product_version",
"name": "5.20",
"product": {
"name": "Schneider Electric Eurotherm EPC3000 Version 5.20",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "EPC3000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm E+PLC100 All Versions",
"product_id": "22"
}
}
],
"category": "product_name",
"name": "E+PLC100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.4.0.0",
"product": {
"name": "Schneider Electric Eurotherm E+PLC400 Versions prior to v1.4.0.0",
"product_id": "23"
}
},
{
"category": "product_version",
"name": "1.4.0.0",
"product": {
"name": "Schneider Electric Eurotherm E+PLC400 Version 1.4.0.0",
"product_id": "24"
}
}
],
"category": "product_name",
"name": "E+PLC400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.3",
"product": {
"name": "Schneider Electric Eurotherm Eycon 10/20 Visual Supervisor Versions prior to 7.3",
"product_id": "25"
}
},
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "Schneider Electric Eurotherm Eycon 10/20 Visual Supervisor Version 7.3",
"product_id": "26"
}
}
],
"category": "product_name",
"name": "Eycon 10/20 Visual Supervisor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.2",
"product": {
"name": "Schneider Electric Eurotherm T2550 PAC Versions prior to 8.2",
"product_id": "27"
}
},
{
"category": "product_version",
"name": "8.2",
"product": {
"name": "Schneider Electric Eurotherm T2550 PAC Version 8.2",
"product_id": "28"
}
}
],
"category": "product_name",
"name": "T2550 PAC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.3",
"product": {
"name": "Schneider Electric Eurotherm T2750 PAC Versions prior to 6.3",
"product_id": "29"
}
},
{
"category": "product_version",
"name": "6.3",
"product": {
"name": "Schneider Electric Eurotherm T2750 PAC Version 6.3",
"product_id": "30"
}
}
],
"category": "product_name",
"name": "T2750 PAC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.02",
"product": {
"name": "Schneider Electric Eurotherm nanodac Versions prior to 10.02",
"product_id": "122"
}
},
{
"category": "product_version",
"name": "10.02",
"product": {
"name": "Schneider Electric Eurotherm nanodac Version 10.02",
"product_id": "123"
}
}
],
"category": "product_name",
"name": "nanodac"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.43",
"product": {
"name": "Schneider Electric Eurotherm Versadac Scalable Data Recorder Versions prior to 2.43",
"product_id": "173"
}
},
{
"category": "product_version",
"name": "2.43",
"product": {
"name": "Schneider Electric Eurotherm Versadac Version 2.43",
"product_id": "174"
}
}
],
"category": "product_name",
"name": "Versadac Scalable Data Recorder"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm 6100A All Versions",
"product_id": "196"
}
}
],
"category": "product_name",
"name": "6100A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm 6180A All Versions",
"product_id": "197"
}
}
],
"category": "product_name",
"name": "6180A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm 6100XIO All Versions",
"product_id": "198"
}
}
],
"category": "product_name",
"name": "6100XIO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm 6180XIO All Versions",
"product_id": "199"
}
}
],
"category": "product_name",
"name": "6180XIO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Eurotherm AeroDAQ All Versions",
"product_id": "200"
}
}
],
"category": "product_name",
"name": "AeroDAQ"
}
],
"category": "product_family",
"name": "Eurotherm"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.2.1",
"product": {
"name": "Schneider Electric Vijeo Designer Basic Versions prior to 1.2.1",
"product_id": "14"
}
},
{
"category": "product_version",
"name": "1.2.1",
"product": {
"name": "Schneider Electric Vijeo Designer Basic Version 1.2.1",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "Vijeo Designer Basic"
},
{
"branches": [
{
"category": "product_name",
"name": "ET6 (HMIET Series)",
"product": {
"name": "Schneider Electric Easy Harmony ET6 (HMIET Series)",
"product_id": "16"
}
},
{
"category": "product_name",
"name": "GXU (HMIGXU Series)",
"product": {
"name": "Schneider Electric Easy Harmony GXU (HMIGXU Series)",
"product_id": "19"
}
}
],
"category": "product_family",
"name": "Easy Harmony"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.2 SP11 Multi HotFix 4",
"product": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP11 Multi HotFix 4",
"product_id": "31"
}
},
{
"category": "product_version",
"name": "6.2 SP11 Multi HotFix 4",
"product": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4",
"product_id": "32"
}
},
{
"category": "product_version_range",
"name": "\u003e=6.2 SP11 Multi HotFix 4",
"product": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 (or above)",
"product_id": "33"
}
},
{
"category": "product_version_range",
"name": "\u003c6.2 SP12",
"product": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP12",
"product_id": "47"
}
},
{
"category": "product_version",
"name": "6.2 SP12",
"product": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP12",
"product_id": "48"
}
},
{
"category": "product_version_range",
"name": "\u003e=6.2 SP12",
"product": {
"name": "Schneider Electric Vijeo Designer Versions 6.2 SP12 (or above)",
"product_id": "49"
}
},
{
"category": "product_version_range",
"name": "\u003c6.3 SP1",
"product": {
"name": "Schneider Electric Vijeo Designer Versions prior to v6.3 SP1",
"product_id": "54"
}
},
{
"category": "product_version",
"name": "6.3 SP1",
"product": {
"name": "Schneider Electric Vijeo Designer Version 6.3 SP1",
"product_id": "55"
}
},
{
"category": "product_version_range",
"name": "\u003e=6.3 SP1",
"product": {
"name": "Schneider Electric Vijeo Designer Version 6.3 SP1 (or above)",
"product_id": "56"
}
}
],
"category": "product_name",
"name": "Vijeo Designer"
},
{
"branches": [
{
"category": "product_name",
"name": "HMIGTU Series",
"product": {
"name": "Schneider Electric Harmony/ Magelis HMIGTU Series",
"product_id": "34"
}
},
{
"category": "product_name",
"name": "HMIGTUX Series",
"product": {
"name": "Schneider Electric Harmony/ Magelis HMIGTUX Series",
"product_id": "35"
}
},
{
"category": "product_name",
"name": "HMIGK Series",
"product": {
"name": "Schneider Electric Harmony/ Magelis HMIGK Series",
"product_id": "36"
}
}
],
"category": "product_family",
"name": "Harmony/ Magelis"
},
{
"category": "product_name",
"name": "HMISCU",
"product": {
"name": "Schneider Electric HMISCU",
"product_id": "46"
}
},
{
"category": "product_name",
"name": "HMISTU Series",
"product": {
"name": "Schneider Electric HMISTU Series",
"product_id": "53"
}
},
{
"category": "product_family",
"name": "TAC I/A Series",
"product": {
"name": "Schneider Electric TAC I/A Series",
"product_id": "60"
}
},
{
"category": "product_name",
"name": "JACE-8000",
"product": {
"name": "Schneider Electric JACE-8000",
"product_id": "61"
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.10u1",
"product": {
"name": "Schneider Electric Niagara Framework Versions prior to v4.10u1",
"product_id": "62"
}
},
{
"category": "product_version",
"name": "4.10u1",
"product": {
"name": "Schneider Electric Niagara Framework Version 4.10u1",
"product_id": "65"
}
}
],
"category": "product_name",
"name": "Niagara Framework"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=B5.x|\u003cB5.118",
"product": {
"name": "Schneider Electric MiCOM C264 Versions greater than or equal to B5.x and prior to B5.118",
"product_id": "67"
}
},
{
"category": "product_version",
"name": "B5.118",
"product": {
"name": "Schneider Electric MiCOM C264 Version B5.118",
"product_id": "68"
}
},
{
"category": "product_version_range",
"name": "\u003e=D1.x|\u003cD1.92",
"product": {
"name": "Schneider Electric MiCOM C264 Versions greater than or equal to D1.x and prior to D1.92",
"product_id": "69"
}
},
{
"category": "product_version",
"name": "D1.92",
"product": {
"name": "Schneider Electric MiCOM C264 Version D1.92",
"product_id": "70"
}
},
{
"category": "product_version_range",
"name": "\u003e=D4.x|\u003cD4.38",
"product": {
"name": "Schneider Electric MiCOM C264 Versions greater than or equal to D4.x and prior to D4.38",
"product_id": "71"
}
},
{
"category": "product_version",
"name": "D4.38",
"product": {
"name": "Schneider Electric MiCOM C264 Version D4.38",
"product_id": "72"
}
},
{
"category": "product_version_range",
"name": "\u003e=D5.x|\u003cD5.25I",
"product": {
"name": "Schneider Electric MiCOM C264 Versions greater than or equal to D5.x and prior to D5.25I",
"product_id": "73"
}
},
{
"category": "product_version",
"name": "D5.25I",
"product": {
"name": "Schneider Electric MiCOM C264 Version D5.25I",
"product_id": "74"
}
},
{
"category": "product_version_range",
"name": "\u003e=D6.x|\u003cD6.18",
"product": {
"name": "Schneider Electric MiCOM C264 Versions greater than or equal to D6.x and prior to D6.18",
"product_id": "75"
}
},
{
"category": "product_version",
"name": "D6.18",
"product": {
"name": "Schneider Electric MiCOM C264 Version D6.18",
"product_id": "76"
}
}
],
"category": "product_name",
"name": "MiCOM C264"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.1.9.34",
"product": {
"name": "Schneider Electric Modicon M241 Logic Controllers Versions prior to 5.1.9.34",
"product_id": "77"
}
},
{
"category": "product_version_range",
"name": "\u003e=5.1.9.34",
"product": {
"name": "Schneider Electric Modicon M241 Logic Controllers Version 5.1.9.34 or greater",
"product_id": "78"
}
}
],
"category": "product_name",
"name": "Modicon M241 Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.1.9.34",
"product": {
"name": "Schneider Electric Modicon M251 Logic Controllers Versions prior to 5.1.9.34",
"product_id": "79"
}
},
{
"category": "product_version_range",
"name": "\u003e=5.1.9.34",
"product": {
"name": "Schneider Electric Modicon M251 Logic Controllers Version 5.1.9.34 or greater",
"product_id": "80"
}
}
],
"category": "product_name",
"name": "Modicon M251 Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.1.6.1",
"product": {
"name": "Schneider Electric Modicon M262 Logic Controllers Versions prior to 5.1.6.1",
"product_id": "81"
}
},
{
"category": "product_version_range",
"name": "\u003e=5.1.6.1",
"product": {
"name": "Schneider Electric Modicon M262 Logic Controllers Version 5.1.6.1 or greater",
"product_id": "82"
}
}
],
"category": "product_name",
"name": "Modicon M262 Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.0.4.18",
"product": {
"name": "Schneider Electric Modicon M258 Logic Controllers Versions prior to 5.0.4.18",
"product_id": "83"
}
},
{
"category": "product_version",
"name": "5.0.4.18",
"product": {
"name": "Schneider Electric Modicon M258 Logic Controllers Version 5.0.4.18",
"product_id": "84"
}
}
],
"category": "product_name",
"name": "Modicon M258 Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.0.4.18",
"product": {
"name": "Schneider Electric Modicon LMC058 Logic Controllers Versions prior to 5.0.4.18",
"product_id": "85"
}
},
{
"category": "product_version",
"name": "5.0.4.18",
"product": {
"name": "Schneider Electric Modicon LMC058 Logic Controllers Version 5.0.4.18",
"product_id": "86"
}
}
],
"category": "product_name",
"name": "Modicon LMC058 Logic Controllers"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.11",
"product": {
"name": "Schneider Electric Modicon M340 Module BMXNOC0401 Versions prior to v2.11",
"product_id": "87"
}
},
{
"category": "product_version",
"name": "2.11",
"product": {
"name": "Schneider Electric Modicon M340 Module BMXNOC0401 Version v2.11",
"product_id": "88"
}
}
],
"category": "product_name",
"name": "BMXNOC0401"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.7 IR24",
"product": {
"name": "Schneider Electric Modicon M340 Module BMXNOR0200 (H) RTU Versions prior to v1.7 IR24",
"product_id": "93"
}
},
{
"category": "product_version",
"name": "1.7 IR24",
"product": {
"name": "Schneider Electric Modicon M340 Module BMXNOR0200 (H) RTU Version 1.7 IR24",
"product_id": "94"
}
}
],
"category": "product_name",
"name": "BMXNOR0200 (H) RTU"
}
],
"category": "product_family",
"name": "Modicon M340 Module"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV3.50",
"product": {
"name": "Schneider Electric Modicon M340 Ethernet Communication Modules BMXNOE0100 (H) Versions prior to SV3.50",
"product_id": "89"
}
},
{
"category": "product_version",
"name": "SV3.50",
"product": {
"name": "Schneider Electric Modicon M340 Ethernet Communication Modules BMXNOE0100 (H) Version SV3.50",
"product_id": "90"
}
}
],
"category": "product_name",
"name": "BMXNOE0100 (H)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV6.70",
"product": {
"name": "Schneider Electric Modicon M340 Ethernet Communication Modules BMXNOE0110 (H) Versions prior to SV6.70",
"product_id": "91"
}
},
{
"category": "product_version",
"name": "SV6.70",
"product": {
"name": "Schneider Electric Modicon M340 Ethernet Communication Modules BMXNOE0110 (H) Version SV6.70",
"product_id": "92"
}
}
],
"category": "product_name",
"name": "BMXNOE0110 (H)"
}
],
"category": "product_family",
"name": "Modicon M340 Ethernet Communication Modules"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.50",
"product": {
"name": "Schneider Electric Modicon M340 CPU Versions prior to 3.50",
"product_id": "95",
"product_identification_helper": {
"model_numbers": [
"BMXP34*"
]
}
}
},
{
"category": "product_version",
"name": "3.50",
"product": {
"name": "Schneider Electric Modicon M340 CPU Version 3.50",
"product_id": "96",
"product_identification_helper": {
"model_numbers": [
"BMXP34*"
]
}
}
}
],
"category": "product_name",
"name": "Modicon M340 CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV4.10",
"product": {
"name": "Schneider Electric Modicon M580 CPU Versions prior to SV4.10",
"product_id": "97",
"product_identification_helper": {
"model_numbers": [
"BMEP*",
"BMEH*"
]
}
}
},
{
"category": "product_version",
"name": "SV4.10",
"product": {
"name": "Schneider Electric Modicon M580 CPU Version SV4.10",
"product_id": "98",
"product_identification_helper": {
"model_numbers": [
"BMEP*",
"BMEH*"
]
}
}
}
],
"category": "product_name",
"name": "Modicon M580 CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV4.21",
"product": {
"name": "Schneider Electric Modicon M580 CPU Safety Versions prior to SV4.21",
"product_id": "99",
"product_identification_helper": {
"model_numbers": [
"BMEP58*S",
"BMEH58*S"
]
}
}
},
{
"category": "product_version",
"name": "SV4.21",
"product": {
"name": "Schneider Electric Modicon M580 CPU Safety Version SV4.21",
"product_id": "100",
"product_identification_helper": {
"model_numbers": [
"BMEP58*S",
"BMEH58*S"
]
}
}
}
],
"category": "product_name",
"name": "Modicon M580 CPU Safety"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=16.0 HF001",
"product": {
"name": "Schneider Electric EcoStruxure\u2122 Control Expert Versions greater than or equal to 16.0 HF001",
"product_id": "201"
}
}
],
"category": "product_name",
"name": "EcoStruxure\u2122 Control Expert"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV2.21",
"product": {
"name": "Schneider Electric Modicon M580 Ethernet Communication Modules BMENOC0301 Versions prior to SV2.21",
"product_id": "101"
}
},
{
"category": "product_version",
"name": "SV2.21",
"product": {
"name": "Schneider Electric Modicon M580 Ethernet Communication Modules BMENOC0301 Version SV2.21",
"product_id": "102"
}
}
],
"category": "product_name",
"name": "BMENOC0301"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV2.21",
"product": {
"name": "Schneider Electric Modicon M580 Ethernet Communication Modules BMENOC0311 Versions prior to SV2.21",
"product_id": "103"
}
},
{
"category": "product_version",
"name": "SV2.21",
"product": {
"name": "Schneider Electric Modicon M580 Ethernet Communication Modules BMENOC0311 Version SV2.21",
"product_id": "104"
}
}
],
"category": "product_name",
"name": "BMENOC0311"
}
],
"category": "product_family",
"name": "Modicon M580 Ethernet Communication Modules"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV1.09",
"product": {
"name": "Schneider Electric Modicon M580 NOC Control BMENOC0321 Versions prior to SV1.09",
"product_id": "105"
}
},
{
"category": "product_version",
"name": "SV1.09",
"product": {
"name": "Schneider Electric Modicon M580 NOC Control BMENOC0321 Version SV1.09",
"product_id": "106"
}
}
],
"category": "product_name",
"name": "BMENOC0321"
}
],
"category": "product_name",
"name": "Modicon M580 NOC Control"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV1.5",
"product": {
"name": "Schneider Electric HART X80 Module BMEAHI0812 Versions prior to SV1.5",
"product_id": "107"
}
},
{
"category": "product_version",
"name": "SV1.5",
"product": {
"name": "Schneider Electric HART X80 Module BMEAHI0812 Version SV1.5",
"product_id": "108"
}
}
],
"category": "product_name",
"name": "BMEAHI0812"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV1.5",
"product": {
"name": "Schneider Electric HART X80 Module BMEAHO0412 Versions prior to SV1.5",
"product_id": "109"
}
},
{
"category": "product_version",
"name": "SV1.5",
"product": {
"name": "Schneider Electric HART X80 Module BMEAHO0412 Version SV1.5",
"product_id": "110"
}
}
],
"category": "product_name",
"name": "BMEAHO0412"
}
],
"category": "product_family",
"name": "HART IO X80 Module"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.8",
"product": {
"name": "Schneider Electric Modicon MC80 Controller Versions prior to v1.8",
"product_id": "111",
"product_identification_helper": {
"model_numbers": [
"BMKC8*"
]
}
}
},
{
"category": "product_version",
"name": "1.8",
"product": {
"name": "Schneider Electric Modicon MC80 Controller Version v1.8",
"product_id": "112",
"product_identification_helper": {
"model_numbers": [
"BMKC80"
]
}
}
}
],
"category": "product_name",
"name": "Modicon MC80 Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Modicon Momentum ENT All Versions",
"product_id": "113",
"product_identification_helper": {
"model_numbers": [
"170ENT11*"
]
}
}
}
],
"category": "product_name",
"name": "Modicon Momentum ENT"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV2.6",
"product": {
"name": "Schneider Electric Modicon Momentum Unity M1E Processor Versions prior to SV2.6",
"product_id": "114",
"product_identification_helper": {
"model_numbers": [
"171CBU*"
]
}
}
},
{
"category": "product_version",
"name": "SV2.6",
"product": {
"name": "Schneider Electric Modicon Momentum Unity M1E Processor Version SV2.6",
"product_id": "115",
"product_identification_helper": {
"model_numbers": [
"171CBU*"
]
}
}
}
],
"category": "product_name",
"name": "Modicon Momentum Unity M1E Processor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Modicon Quantum CPU and Communication Modules All Versions",
"product_id": "116"
}
}
],
"category": "product_name",
"name": "Modicon Quantum CPU and Communication Modules"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Modicon Premium CPU and Communication Modules All Versions",
"product_id": "117"
}
}
],
"category": "product_name",
"name": "Modicon Premium CPU and Communication Modules"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.60",
"product": {
"name": "Schneider Electric Modicon X80 Module BMXNOM0200 Versions prior to v1.60",
"product_id": "118"
}
},
{
"category": "product_version",
"name": "1.60",
"product": {
"name": "Schneider Electric Modicon X80 Module BMXNOM0200 Version 1.60",
"product_id": "119"
}
}
],
"category": "product_name",
"name": "BMXNOM0200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.04",
"product": {
"name": "Schneider Electric Modicon X80 Module BMENOS0300 Versions prior to v1.04",
"product_id": "120"
}
},
{
"category": "product_version",
"name": "1.04",
"product": {
"name": "Schneider Electric Modicon X80 Module BMENOS0300 Version 1.04",
"product_id": "121"
}
}
],
"category": "product_name",
"name": "BMENOS0300"
}
],
"category": "product_family",
"name": "Modicon X80 Module"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Eco Logic Controllers Versions prior to 1.66.5.1",
"product_id": "124"
}
},
{
"category": "product_version",
"name": "1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Eco Logic Controllers Version 1.66.5.1",
"product_id": "125"
}
}
],
"category": "product_name",
"name": "PacDrive Eco Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Pro Logic Controllers Versions prior to 1.66.5.1",
"product_id": "126"
}
},
{
"category": "product_version",
"name": "1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Pro Logic Controllers Version 1.66.5.1",
"product_id": "127"
}
}
],
"category": "product_name",
"name": "PacDrive Pro Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Pro2 Logic Controllers Versions prior to 1.66.5.1",
"product_id": "128"
}
},
{
"category": "product_version",
"name": "1.66.5.1",
"product": {
"name": "Schneider Electric PacDrive Pro2 Logic Controllers Version 1.66.5.1",
"product_id": "129"
}
}
],
"category": "product_name",
"name": "PacDrive Pro2 Logic Controllers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric PacDrive M Logic Controller All Versions",
"product_id": "130"
}
}
],
"category": "product_name",
"name": "PacDrive M Logic Controller"
}
],
"category": "product_family",
"name": "PacDrive"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.1",
"product": {
"name": "Schneider Electric PowerLogic ION7400 Versions prior to v3.1",
"product_id": "131"
}
},
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "Schneider Electric PowerLogic ION7400 Version 3.1",
"product_id": "132"
}
}
],
"category": "product_name",
"name": "ION7400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.1",
"product": {
"name": "Schneider Electric PowerLogic PM8000 Versions prior to v3.1",
"product_id": "133"
}
},
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "Schneider Electric PowerLogic PM8000 Version 3.1",
"product_id": "134"
}
}
],
"category": "product_name",
"name": "PM8000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.1",
"product": {
"name": "Schneider Electric PowerLogic ION9000 Versions prior to v3.1",
"product_id": "135"
}
},
{
"category": "product_version_range",
"name": "3.1",
"product": {
"name": "Schneider Electric PowerLogic ION9000 Version 3.1",
"product_id": "136"
}
}
],
"category": "product_name",
"name": "ION9000"
}
],
"category": "product_family",
"name": "PowerLogic"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.09.350",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350",
"product_id": "137"
}
},
{
"category": "product_version_range",
"name": "\u003e=4.09.350",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later",
"product_id": "138"
}
},
{
"category": "product_version_range",
"name": "\u003c4.09.450",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.450",
"product_id": "147"
}
},
{
"category": "product_version_range",
"name": "\u003e=4.09.450",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.450 or later",
"product_id": "148"
}
},
{
"category": "product_version_range",
"name": "\u003c4.09.400",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.400",
"product_id": "149"
}
},
{
"category": "product_version_range",
"name": "\u003e=4.09.400",
"product": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.400 or later",
"product_id": "150"
}
}
],
"category": "product_name",
"name": "GP-Pro EX"
},
{
"category": "product_name",
"name": "SP-5B00",
"product": {
"name": "Schneider Electric Pro-face SP-5B00",
"product_id": "139"
}
},
{
"category": "product_name",
"name": "SP-5B10",
"product": {
"name": "Schneider Electric Pro-face SP-5B10",
"product_id": "140"
}
},
{
"category": "product_name",
"name": "SP-5B90",
"product": {
"name": "Schneider Electric Pro-face SP-5B90",
"product_id": "141"
}
},
{
"category": "product_name",
"name": "ST6000 Series",
"product": {
"name": "Schneider Electric Pro-face ST6000 Series (GP-ProEX model)",
"product_id": "142"
}
},
{
"category": "product_name",
"name": "ET6000 Series",
"product": {
"name": "Schneider Electric Pro-face ET6000 Series",
"product_id": "143"
}
},
{
"category": "product_name",
"name": "LT4000M Series",
"product": {
"name": "Schneider Electric Pro-face LT4000M Series",
"product_id": "144"
}
},
{
"category": "product_name",
"name": "GP4000 Series",
"product": {
"name": "Schneider Electric Pro-face GP4000 Series",
"product_id": "145"
}
},
{
"category": "product_name",
"name": "GP4000H Series",
"product": {
"name": "Schneider Electric Pro-face GP4000H Series",
"product_id": "146"
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Pro-face GP4100 Series All Versions",
"product_id": "193"
}
}
],
"category": "product_name",
"name": "GP4100 Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Pro-face GP4000E Series All Versions",
"product_id": "194"
}
}
],
"category": "product_name",
"name": "GP4000E Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Pro-face GP4000M Series All Versions",
"product_id": "195"
}
}
],
"category": "product_name",
"name": "GP4000M Series"
}
],
"category": "product_family",
"name": "Pro-face"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Profibus Remote Master TCSEGPA23F14F All Versions",
"product_id": "167"
}
}
],
"category": "product_name",
"name": "TCSEGPA23F14F"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Profibus Remote Master BMECXM0100 All Versions",
"product_id": "168"
}
}
],
"category": "product_name",
"name": "BMECXM0100"
}
],
"category": "product_family",
"name": "Profibus Remote Master"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSY-1101207_N",
"product": {
"name": "Schneider Electric SCD6000 Industrial RTU Versions prior to SY-1101207_N",
"product_id": "169"
}
},
{
"category": "product_version",
"name": "SY-1101207_N",
"product": {
"name": "Schneider Electric SCD6000 Industrial RTU Version SY-1101207_N",
"product_id": "170"
}
}
],
"category": "product_name",
"name": "SCD6000 Industrial RTU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cC3414-500-S02K5_P5",
"product": {
"name": "Schneider Electric SAGE RTU CPU C3414 Versions prior to C3414-500-S02K5_P5",
"product_id": "171"
}
},
{
"category": "product_version",
"name": "C3414-500-S02K5_P5",
"product": {
"name": "Schneider Electric SAGE RTU CPU C3414 Version C3414-500-S02K5_P5",
"product_id": "172"
}
}
],
"category": "product_name",
"name": "SAGE RTU CPU C3414"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV02.80",
"product": {
"name": "Schneider Electric BMECRA31210 Versions prior to SV02.80",
"product_id": "175"
}
},
{
"category": "product_version",
"name": "SV02.80",
"product": {
"name": "Schneider Electric BMECRA31210 Version SV02.80",
"product_id": "176"
}
}
],
"category": "product_name",
"name": "BMECRA31210"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV02.80",
"product": {
"name": "Schneider Electric BMXCRA31200 Versions prior to SV02.80",
"product_id": "177"
}
},
{
"category": "product_version",
"name": "SV02.80",
"product": {
"name": "Schneider Electric BMXCRA31200 Version SV02.80",
"product_id": "178"
}
}
],
"category": "product_name",
"name": "BMXCRA31200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSV02.80",
"product": {
"name": "Schneider Electric BMXCRA31210 Versions prior to SV02.80",
"product_id": "179"
}
},
{
"category": "product_version",
"name": "SV02.80",
"product": {
"name": "Schneider Electric BMXCRA31210 Version SV02.80",
"product_id": "180"
}
}
],
"category": "product_name",
"name": "BMXCRA31210"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c02.80",
"product": {
"name": "Schneider Electric 140CRA31200 (Quantum RIO Drop) Versions prior to V02.80",
"product_id": "181"
}
},
{
"category": "product_version_range",
"name": "02.80",
"product": {
"name": "Schneider Electric 140CRA31200 (Quantum RIO Drop) Version 02.80",
"product_id": "182"
}
}
],
"category": "product_name",
"name": "140CRA31200 (Quantum RIO Drop)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c02.80",
"product": {
"name": "Schneider Electric 140CRA31908 (M580 Quantum S908 RIO Drop Adapter) Versions prior to V02.80",
"product_id": "183"
}
},
{
"category": "product_version_range",
"name": "02.80",
"product": {
"name": "Schneider Electric 140CRA31908 (M580 Quantum S908 RIO Drop Adapter) Version 02.80",
"product_id": "184"
}
}
],
"category": "product_name",
"name": "140CRA31908 (M580 Quantum S908 RIO Drop Adapter)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c02.80",
"product": {
"name": "Schneider Electric BMENOP0300 Versions prior to SV2.6",
"product_id": "185"
}
},
{
"category": "product_version_range",
"name": "SV2.6",
"product": {
"name": "Schneider Electric BMENOP0300 Version SV2.6",
"product_id": "186"
}
}
],
"category": "product_name",
"name": "BMENOP0300"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric BMXNGD0100 All Versions",
"product_id": "187"
}
}
],
"category": "product_name",
"name": "BMXNGD0100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Easergy MiCOM P40 All Versions",
"product_id": "189"
}
}
],
"category": "product_name",
"name": "Easergy MiCOM P40"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric EPack All Versions",
"product_id": "190"
}
}
],
"category": "product_name",
"name": "EPack"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric HMISTO5 Series All Versions",
"product_id": "191"
}
}
],
"category": "product_name",
"name": "HMISTO5 Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric Modicon LMC078 All Versions",
"product_id": "192"
}
}
],
"category": "product_name",
"name": "Modicon LMC078"
}
],
"category": "vendor",
"name": "Schneider Electric"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Basic Versions prior to 1.2.1 installed on Schneider Electric Easy Harmony ET6 (HMIET Series)",
"product_id": "17"
},
"product_reference": "14",
"relates_to_product_reference": "16"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Basic Version 1.2.1 installed on Schneider Electric Easy Harmony ET6 (HMIET Series)",
"product_id": "18"
},
"product_reference": "15",
"relates_to_product_reference": "16"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Basic Versions prior to 1.2.1 installed on Schneider Electric Easy Harmony GXU (HMIGXU Series)",
"product_id": "20"
},
"product_reference": "14",
"relates_to_product_reference": "19"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Basic Version 1.2.1 installed on Schneider Electric Easy Harmony GXU (HMIGXU Series)",
"product_id": "21"
},
"product_reference": "15",
"relates_to_product_reference": "19"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGTU Series",
"product_id": "37"
},
"product_reference": "31",
"relates_to_product_reference": "34"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGTU Series",
"product_id": "38"
},
"product_reference": "32",
"relates_to_product_reference": "34"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 (or above) installed on Schneider Electric Harmony/ Magelis HMIGTU Series",
"product_id": "39"
},
"product_reference": "33",
"relates_to_product_reference": "34"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGTUX Series",
"product_id": "40"
},
"product_reference": "31",
"relates_to_product_reference": "35"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGTUX Series",
"product_id": "41"
},
"product_reference": "32",
"relates_to_product_reference": "35"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 (or above) installed on Schneider Electric Harmony/ Magelis HMIGTUX Series",
"product_id": "42"
},
"product_reference": "33",
"relates_to_product_reference": "35"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGK Series",
"product_id": "43"
},
"product_reference": "31",
"relates_to_product_reference": "36"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 installed on Schneider Electric Harmony/ Magelis HMIGK Series",
"product_id": "44"
},
"product_reference": "32",
"relates_to_product_reference": "36"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP11 Multi HotFix 4 (or above) installed on Schneider Electric Harmony/ Magelis HMIGK Series",
"product_id": "45"
},
"product_reference": "33",
"relates_to_product_reference": "36"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions prior to 6.2 SP12 installed on Schneider Electric HMISCU",
"product_id": "50"
},
"product_reference": "47",
"relates_to_product_reference": "46"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.2 SP12 installed on Schneider Electric HMISCU",
"product_id": "51"
},
"product_reference": "48",
"relates_to_product_reference": "46"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions 6.2 SP12 (or above) installed on Schneider Electric HMISCU",
"product_id": "52"
},
"product_reference": "49",
"relates_to_product_reference": "46"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Versions prior to v6.3 SP1 installed on Schneider Electric HMISTU Series",
"product_id": "57"
},
"product_reference": "54",
"relates_to_product_reference": "53"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.3 SP1 installed on Schneider Electric HMISTU Series",
"product_id": "58"
},
"product_reference": "55",
"relates_to_product_reference": "53"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Vijeo Designer Version 6.3 SP1 (or above) installed on Schneider Electric HMISTU Series",
"product_id": "59"
},
"product_reference": "56",
"relates_to_product_reference": "53"
},
{
"category": "optional_component_of",
"full_product_name": {
"name": "Schneider Electric JACE-8000 optional component of Schneider Electric TAC I/A Series",
"product_id": "63"
},
"product_reference": "61",
"relates_to_product_reference": "60"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Niagara Framework Versions prior to v4.10u1 installed on JACE-8000 optional component of Schneider Electric TAC I/A Series",
"product_id": "64"
},
"product_reference": "62",
"relates_to_product_reference": "63"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Niagara Framework Version 4.10u1 installed on JACE-8000 optional component of Schneider Electric TAC I/A Series",
"product_id": "66"
},
"product_reference": "65",
"relates_to_product_reference": "63"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350 installed on Schneider Electric Pro-face SP-5B00",
"product_id": "151"
},
"product_reference": "137",
"relates_to_product_reference": "139"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350 installed on Schneider Electric Pro-face SP-5B10",
"product_id": "152"
},
"product_reference": "137",
"relates_to_product_reference": "140"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350 installed on Schneider Electric Pro-face SP-5B90",
"product_id": "153"
},
"product_reference": "137",
"relates_to_product_reference": "141"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350 installed on Schneider Electric Pro-face ST6000 Series (GP-ProEX model)",
"product_id": "154"
},
"product_reference": "137",
"relates_to_product_reference": "142"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.350 installed on Schneider Electric Pro-face ET6000 Series",
"product_id": "155"
},
"product_reference": "137",
"relates_to_product_reference": "143"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later installed on Schneider Electric Pro-face SP-5B00",
"product_id": "156"
},
"product_reference": "138",
"relates_to_product_reference": "139"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later installed on Schneider Electric Pro-face SP-5B10",
"product_id": "157"
},
"product_reference": "138",
"relates_to_product_reference": "140"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later installed on Schneider Electric Pro-face SP-5B90",
"product_id": "158"
},
"product_reference": "138",
"relates_to_product_reference": "141"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later installed on Schneider Electric Pro-face ST6000 Series (GP-ProEX model)",
"product_id": "159"
},
"product_reference": "138",
"relates_to_product_reference": "142"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.350 or later installed on Schneider Electric Pro-face ET6000 Series",
"product_id": "160"
},
"product_reference": "138",
"relates_to_product_reference": "143"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.450 installed on Schneider Electric Pro-face LT4000M Series",
"product_id": "161"
},
"product_reference": "147",
"relates_to_product_reference": "144"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.450 or later installed on Schneider Electric Pro-face LT4000M Series",
"product_id": "162"
},
"product_reference": "148",
"relates_to_product_reference": "144"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.400 installed on Schneider Electric Pro-face GP4000 Series",
"product_id": "163"
},
"product_reference": "149",
"relates_to_product_reference": "145"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Versions prior to 4.09.400 installed on Schneider Electric Pro-face GP4000H Series",
"product_id": "164"
},
"product_reference": "149",
"relates_to_product_reference": "146"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.400 or later installed on Schneider Electric Pro-face GP4000 Series",
"product_id": "165"
},
"product_reference": "150",
"relates_to_product_reference": "145"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Pro-face GP-Pro EX Version 4.09.400 or later installed on Schneider Electric Pro-face GP4000H Series",
"product_id": "166"
},
"product_reference": "150",
"relates_to_product_reference": "146"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Schneider Electric Modicon M580 CPU Safety Version SV4.21 installed on Schneider Electric EcoStruxure\u2122 Control Expert Versions greater than or equal to 16.0 HF001",
"product_id": "202"
},
"product_reference": "100",
"relates_to_product_reference": "201"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"urls": [
"https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04"
]
}
],
"cve": "CVE-2020-35198",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered in Wind River VxWorks 7. The memory allocator has a possible integer overflow in calculating a memory block\u0027s size to be allocated by calloc(). As a result, the actual memory allocated is smaller than the buffer size specified by the arguments, leading to memory corruption.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"2",
"4",
"6",
"11",
"13",
"18",
"21",
"24",
"26",
"28",
"30",
"38",
"39",
"41",
"42",
"44",
"45",
"51",
"52",
"58",
"59",
"68",
"70",
"72",
"74",
"76",
"78",
"80",
"82",
"84",
"86",
"88",
"90",
"92",
"94",
"96",
"98",
"102",
"104",
"106",
"108",
"110",
"112",
"115",
"119",
"121",
"123",
"125",
"127",
"129",
"132",
"134",
"136",
"156",
"157",
"158",
"159",
"160",
"162",
"165",
"166",
"170",
"172",
"174",
"176",
"178",
"180",
"182",
"184",
"186",
"202"
],
"known_affected": [
"1",
"3",
"5",
"7",
"10",
"12",
"17",
"20",
"22",
"23",
"25",
"27",
"29",
"37",
"40",
"43",
"50",
"57",
"67",
"69",
"71",
"73",
"75",
"77",
"79",
"81",
"83",
"85",
"87",
"89",
"91",
"93",
"95",
"97",
"99",
"101",
"103",
"105",
"107",
"109",
"111",
"113",
"114",
"116",
"117",
"118",
"120",
"122",
"124",
"126",
"128",
"130",
"131",
"133",
"135",
"151",
"152",
"153",
"154",
"155",
"161",
"163",
"164",
"167",
"168",
"169",
"171",
"173",
"175",
"177",
"179",
"181",
"183",
"185",
"187",
"188",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version 1.0.5 of Easergy C5 includes a fix for these vulnerabilities and \nis available through Schneider Electric regional DPACs.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Easergy MiCOM P638 Version 676.701 of the P30 firmware includes a fix for these vulnerabilities and is available on request from Schneider Electric\u2019s Customer Care",
"product_ids": [
"5"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "All other Easergy MiCOM P30 Models: Version 675 and later of the P30 firmware includes a fix for these vulnerabilities and is available on request from Schneider Electric\u2019s Customer Care Center.",
"product_ids": [
"3"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit: \u2022 Use relays only in a protected environment to minimize network exposure and ensure that they are not accessible from outside. \u2022 Disable unused network protocol interfaces. \u2022 Use firewalls to protect and separate the control system network from other networks. \u2022 Activate and apply user management and password features. ",
"product_ids": [
"7"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 4.03 of the EPC2000 includes a fix for these vulnerabilities and is available for download here:https://www.eurotherm.com/?wpdmdl=137741",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.eurotherm.com/?wpdmdl=137741"
},
{
"category": "vendor_fix",
"details": "Version 5.20 of the EPC3000 includes a fix for these vulnerabilities and is available for download here:https://www.eurotherm.com/?wpdmdl=89545 Device will reboot automatically after upgrade.",
"product_ids": [
"12"
],
"restart_required": {
"category": "system"
},
"url": "https://www.eurotherm.com/?wpdmdl=89545"
},
{
"category": "vendor_fix",
"details": "Version 1.2.1 of Vijeo Designer Basic includes a fix for these vulnerabilities. Please contact your Schneider Electric\u2019s Customer Care Center to obtain the installer. To complete the update, connect to Harmony HMI and download the firmware using Vijeo Designer Basic V1.2.1.",
"product_ids": [
"17",
"20"
],
"restart_required": {
"category": "none"
}
},
{
"category": "no_fix_planned",
"details": "The E+PLC100 product has reached its end of life and is no longer supported.",
"product_ids": [
"22"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the E+PLC100 device and any remote visualization workstations running the E+PLC tools.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"22"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.4.0.0 of the E+PLC400 firmware is available and includes a fix for these vulnerabilities. Please contact the Eurotherm Support team to obtain the firmware update. Please be sure to include the following when contacting the support team:\u2022 End Username, Company, and Email Address\u2022 Serial numbers of the devices to be upgraded\u2022 Current E+PLC400 firmware version",
"product_ids": [
"23"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.4.0.0 of the E+PLC400 firmware is available and includes a fix for these vulnerabilities. Please contact the Eurotherm Support team to obtain the firmware update. Please be sure to include the following when contacting the support team:\u2022 End Username, Company, and Email Address\u2022 Serial numbers of the devices to be upgraded\u2022 Current E+PLC400 firmware versionVersion 7.3 of the Eycon firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login",
"product_ids": [
"25"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 8.2 of the T2550 firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login ",
"product_ids": [
"27"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 6.3 of the T2750 firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link:https://partners.eurotherm.com/member-login",
"product_ids": [
"29"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 6.2 SP11 Multi HotFix 4 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. On the engineering workstation, update to V6.2 SP11 Multi HotFix 4 (or above) of Vijeo Designer.To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.2 SP11 Multi HotFix 4.",
"product_ids": [
"37",
"40",
"43"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 6.2 SP12 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. On the engineering workstation, update to V6.2 SP12 (or above) of Vijeo Designer. To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.2 SP12.",
"product_ids": [
"50"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 6.3 SP1 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. https://www.se.com/ww/en/product-range/1054-vijeo-designer-hmi-software/#software-and-firmware On the engineering workstation, update to V6.3 SP1 (or above) of Vijeo Designer. To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.3 SP1.",
"product_ids": [
"57"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/1054-vijeo-designer-hmi-software/#software-and-firmware"
},
{
"category": "vendor_fix",
"details": "Versions B5.118, D1.92, D4.38, D5.25I and D6.18 of MiCOM C264 include a fix for these vulnerabilities and are available through Schneider Electric regional DPACs.",
"product_ids": [
"67",
"69",
"71",
"73",
"75"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 5.1.9.34 of Modicon M241/M251 Logic Controllers includes a fix for these vulnerabilities.On the engineering workstation, update to latest version of EcoStruxure Machine Expert: https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control To complete the update on Modicon M241/M251 Logic Controllers, update to firmware version V5.1.9.34 or higher available within EcoStruxure Machine Expert. A reboot is needed.",
"product_ids": [
"77",
"79"
],
"restart_required": {
"category": "system"
},
"url": "https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control"
},
{
"category": "vendor_fix",
"details": "Version 5.1.6.1 of Modicon M262 Logic Controllers includes a fix for these vulnerabilities.On the engineering workstation, update to latest version of EcoStruxure Machine Expert: https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-controlTo complete the update on Modicon M262 Logic Controllers, update to firmware version V5.1.6.1 or higher available within EcoStruxure Machine Expert. A reboot is needed.",
"product_ids": [
"81"
],
"restart_required": {
"category": "system"
},
"url": "https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control"
},
{
"category": "vendor_fix",
"details": "Firmware Version 5.0.4.18 of Modicon M258/LMC058 logic controllers includes a fix for these vulnerabilities and can be updated through Schneider Electric Software Update (SESU) application.",
"product_ids": [
"83",
"85"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 2.11 of BMXNOC0401 includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOC0401/",
"product_ids": [
"87"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOC0401/"
},
{
"category": "vendor_fix",
"details": "Version SV3.50 of BMXNOE0100 (H) includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXNOE0100_SV_03.50/",
"product_ids": [
"89"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXNOE0100_SV_03.50/"
},
{
"category": "vendor_fix",
"details": "Version SV6.70 of BMXNOE0110 (H) includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXNOE0110_SV_06.70/",
"product_ids": [
"91"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXNOE0110_SV_06.70/"
},
{
"category": "vendor_fix",
"details": "Version 1.7 IR24 of BMXNOR0200H includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOR0200H/",
"product_ids": [
"93"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOR0200H/"
},
{
"category": "vendor_fix",
"details": "Version 3.50 of Modicon M340 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXP34xxxxx_SV_03.50/ ",
"product_ids": [
"95"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXP34xxxxx_SV_03.50/"
},
{
"category": "vendor_fix",
"details": "Version SV4.10 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/download/document/BMEx58x0x0_SV04.10/",
"product_ids": [
"97"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMEx58x0x0_SV04.10/"
},
{
"category": "vendor_fix",
"details": "Version SV4.21 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-range/62098-modicon-m580-pac-controller/#software-and-firmware Important: customer needs to use version of EcoStruxure\u2122 Control Expert V16.0 HF001 minimum to connect with the latest version of M580 CPU Safety. The software is available for download here: https://www.se.com/ww/en/product-range/548-ecostruxure-control-expert-unity-pro/#software-and-firmware",
"product_ids": [
"99"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/62098-modicon-m580-pac-controller/#software-and-firmware"
},
{
"category": "vendor_fix",
"details": "Version SV2.21 includes a fix for these vulnerabilities and is available for download here: BMENOC 0301 - https://www.se.com/ww/en/download/document/BMENOC0301_SV_02.21/",
"product_ids": [
"101"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0301_SV_02.21/"
},
{
"category": "vendor_fix",
"details": "Version SV2.21 includes a fix for these vulnerabilities and is available for download here: BMENOC 0311 -https://www.se.com/ww/en/download/document/BMENOC0311_SV_02.21",
"product_ids": [
"103"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0311_SV_02.21"
},
{
"category": "vendor_fix",
"details": "Version SV1.09 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMENOC0321_SV_01.09",
"product_ids": [
"105"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0321_SV_01.09"
},
{
"category": "vendor_fix",
"details": "Version SV1.5 of HART X80 Module includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMEAHO0412_Firmware_upgrade/",
"product_ids": [
"107",
"109"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMEAHO0412_Firmware_upgrade/"
},
{
"category": "vendor_fix",
"details": "Version 1.8 of MC80 Controller (BMKC80) includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-range/62396-modicon-mc80/#software-and-firmware",
"product_ids": [
"111"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/62396-modicon-mc80/#software-and-firmware"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations in the device user manual.\u2022 Setup a VPN between the Modicon PLC device and the remote engineering workstations.\u2022 Activate and apply user management and password features.\u2022 Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"113"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version SV2.6 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/download/document/Momentum_FW_update/ ",
"product_ids": [
"114"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/Momentum_FW_update/"
},
{
"category": "no_fix_planned",
"details": "Quantum and Premium offers have reached their end of life and are no longer supported.",
"product_ids": [
"116",
"117"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Setup a VPN between the Modicon PLC device and the remote engineering workstations.\u2022 Activate and apply user management and password features.\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering Modicon M580 ePAC.",
"product_ids": [
"116",
"117"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.60 of BMXNOM0200 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOM0200/ ",
"product_ids": [
"118"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOM0200/"
},
{
"category": "vendor_fix",
"details": "Version 1.04 of BMENOS0300 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMENOS0300/",
"product_ids": [
"120"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMENOS0300/"
},
{
"category": "vendor_fix",
"details": "Version 10.02 of nanodac includes a fix for this vulnerability and is available for download here: https://www.eurotherm.com/?wpdmdl=28419 Device will reboot automatically after upgrade.",
"product_ids": [
"122"
],
"restart_required": {
"category": "system"
},
"url": "https://www.eurotherm.com/?wpdmdl=28419"
},
{
"category": "vendor_fix",
"details": "Firmware Version 1.66.5.1 of PacDrive Eco/Pro/Pro2 Logic Controllers includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application.",
"product_ids": [
"124",
"126",
"128"
],
"restart_required": {
"category": "none"
}
},
{
"category": "no_fix_planned",
"details": "PacDrive M Logic Controller has reached its end of life and is no longer supported.",
"product_ids": [
"130"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside,\u2022 Use firewalls to protect and separate the control system network from other networks,\u2022 Use VPN (Virtual Private Networks) tunnels if remote access is required,\u2022 Activate and apply user management and password features,\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering PacDrive Eco/Pro/Pro2 to resolve this issue.",
"product_ids": [
"130"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic ION7400 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/ION7400_meter_FW_v003.001.000/",
"product_ids": [
"131"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/ION7400_meter_FW_v003.001.000/"
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic PM8000 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/PM8000_meter_FW_v003.001.000/",
"product_ids": [
"133"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/PM8000_meter_FW_v003.001.000/"
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic ION9000 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/ION9000_meter_FW_v003.001.000/",
"product_ids": [
"135"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/ION9000_meter_FW_v003.001.000/"
},
{
"category": "mitigation",
"details": "If the update cannot be applied immediately, please follow the guidelines in Schneider Electric Recommended Cybersecurity Best Practices document to help mitigate the risk.",
"product_ids": [
"131",
"133",
"135"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 4.09.350 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d).To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.350 or later.",
"product_ids": [
"151",
"152",
"153",
"154",
"155"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "vendor_fix",
"details": "Version 4.09.450 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d). To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.400 or later.",
"product_ids": [
"161"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "vendor_fix",
"details": "Version 4.09.400 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d). To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.400 or later.",
"product_ids": [
"163",
"164"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the mitigations found in the Cybersecurity Reference Manual linked below to reduce the risk of exploit: https://www.se.com/ww/en/download/document/EIO0000001999/",
"product_ids": [
"167",
"168"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/EIO0000001999/"
},
{
"category": "vendor_fix",
"details": "Version SY-1101207, Version N of SCD6000 firmware includes a fix for this vulnerability. Contact your local Customer Support to receive this firmware version. Reboot is required after installation.",
"product_ids": [
"169"
],
"restart_required": {
"category": "system"
}
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here: https://www.sage-rtu.com/downloads.html Reboot of SAGE RTU is required after firmware upgrade.This fix applies a Wind River VxWorks (real-time operating system) patch to bring code libraries current to 6.9.4.12 RCPL3 revision. This corrects issues with overflow causing malloc/calloc to return valid pointer when it should return fail indication NULL pointer.",
"product_ids": [
"171"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
},
{
"category": "vendor_fix",
"details": "Version 2.43 of the Versadac scalable data recorder is available and includes a fix for these vulnerabilities.Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login",
"product_ids": [
"173"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version SV02.80 of BMECRA31210, BMXCRA3120, BMXCRA31210 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMXCRA31210",
"product_ids": [
"175",
"177",
"179"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMXCRA31210"
},
{
"category": "vendor_fix",
"details": "Version V02.80 of 140CRA31200 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product/140CRA31200/quantum-rio-drop-e-ip-1ch",
"product_ids": [
"181"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/140CRA31200/quantum-rio-drop-e-ip-1ch"
},
{
"category": "vendor_fix",
"details": "Version V02.80 of 140CRA31908 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product/140CRA31908/m580-quantum-s908-rio-drop-adapter",
"product_ids": [
"183"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/140CRA31908/m580-quantum-s908-rio-drop-adapter"
},
{
"category": "vendor_fix",
"details": "Version SV2.6 of BMENOP0300 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMENOP0300",
"product_ids": [
"185"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMENOP0300"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the Modicon. Communication modules and the remote engineering workstations.\u2022 Activate and apply user management and password features.Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"187"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit: \u2022 Use relays only in a protected environment to minimize network exposure and ensure that they are not accessible from outside.\u2022 Disable unused network protocol interfaces.\u2022 Use firewalls to protect and separate the control system network from other networks.\u2022 Activate and apply user management and password features.\u2022 Limit the access to the system by physical means.",
"product_ids": [
"188"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the EPack device and any remote visualization workstations running iTools.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"190"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\u2022 Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\u2022 Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.When remote access is required, use secure methods, such as the Vijeo Connect.",
"product_ids": [
"191"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside,\u2022 Use firewalls to protect and separate the control system network from other networks,\u2022 Use VPN (Virtual Private Networks) tunnels if remote access is required,\u2022 Activate and apply user management and password features,\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering Modicon M262 to resolve this issue.",
"product_ids": [
"192"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the followingmitigations to reduce the risk of exploit:\u2022 Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\u2022 Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment,and networks.\u2022 Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\u2022 When remote access is required, use secure methods, such as the Pro-face Connect.Customers should also consider upgrading to the latest product offering to resolve this issue. Please contact your sales support about alternative products",
"product_ids": [
"193",
"194",
"195"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the 6000-series device and any remote visualization workstations running Bridge.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"196",
"197",
"198",
"199",
"200"
],
"restart_required": {
"category": "none"
}
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"3",
"5",
"7",
"10",
"12",
"17",
"20",
"22",
"23",
"25",
"27",
"29",
"37",
"40",
"43",
"50",
"57",
"67",
"69",
"71",
"73",
"75",
"77",
"79",
"81",
"83",
"85",
"87",
"89",
"91",
"93",
"95",
"97",
"99",
"101",
"103",
"105",
"107",
"109",
"111",
"113",
"114",
"116",
"117",
"118",
"120",
"122",
"124",
"126",
"128",
"130",
"131",
"133",
"135",
"151",
"152",
"153",
"154",
"155",
"161",
"163",
"164",
"167",
"168",
"169",
"171",
"173",
"175",
"177",
"179",
"181",
"183",
"185",
"187",
"188",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200"
]
}
],
"title": "CVE-2020-35198"
},
{
"acknowledgments": [
{
"urls": [
"https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04"
]
}
],
"cve": "CVE-2020-28895",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "In Wind River VxWorks, memory allocator has a possible overflow in calculating the memory block\u0027s size to be allocated by calloc(). As a result, the actual memory allocated is smaller than the buffer size specified by the arguments, leading to memory corruption.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"2",
"4",
"6",
"9",
"11",
"13",
"18",
"21",
"24",
"26",
"28",
"30",
"38",
"39",
"41",
"42",
"44",
"45",
"51",
"52",
"58",
"59",
"68",
"70",
"72",
"74",
"76",
"78",
"80",
"82",
"84",
"86",
"88",
"90",
"92",
"94",
"96",
"98",
"102",
"104",
"106",
"108",
"110",
"112",
"115",
"119",
"121",
"123",
"125",
"127",
"129",
"132",
"134",
"136",
"156",
"157",
"158",
"159",
"160",
"162",
"165",
"166",
"170",
"172",
"174",
"176",
"178",
"180",
"182",
"184",
"186",
"202"
],
"known_affected": [
"1",
"3",
"5",
"7",
"8",
"10",
"12",
"17",
"20",
"22",
"23",
"25",
"27",
"29",
"37",
"40",
"43",
"50",
"57",
"67",
"69",
"71",
"73",
"75",
"77",
"79",
"81",
"83",
"85",
"87",
"89",
"91",
"93",
"95",
"97",
"99",
"101",
"103",
"105",
"107",
"109",
"111",
"113",
"114",
"116",
"117",
"118",
"120",
"122",
"124",
"126",
"128",
"130",
"131",
"133",
"135",
"151",
"152",
"153",
"154",
"155",
"161",
"163",
"164",
"167",
"168",
"169",
"171",
"173",
"175",
"177",
"179",
"181",
"183",
"185",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version 1.0.5 of Easergy C5 includes a fix for these vulnerabilities and \nis available through Schneider Electric regional DPACs.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Easergy MiCOM P638 Version 676.701 of the P30 firmware includes a fix for these vulnerabilities and is available on request from Schneider Electric\u2019s Customer Care",
"product_ids": [
"5"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "All other Easergy MiCOM P30 Models: Version 675 and later of the P30 firmware includes a fix for these vulnerabilities and is available on request from Schneider Electric\u2019s Customer Care Center.",
"product_ids": [
"3"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit: \u2022 Use relays only in a protected environment to minimize network exposure and ensure that they are not accessible from outside. \u2022 Disable unused network protocol interfaces. \u2022 Use firewalls to protect and separate the control system network from other networks. \u2022 Activate and apply user management and password features. ",
"product_ids": [
"7"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 01.401.101 of Easergy P5 firmware includes a fix for this vulnerability and is available on request from Schneider Electric\u0027s Customer Care Center. ",
"product_ids": [
"8"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 4.03 of the EPC2000 includes a fix for these vulnerabilities and is available for download here:https://www.eurotherm.com/?wpdmdl=137741",
"product_ids": [
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://www.eurotherm.com/?wpdmdl=137741"
},
{
"category": "vendor_fix",
"details": "Version 5.20 of the EPC3000 includes a fix for these vulnerabilities and is available for download here:https://www.eurotherm.com/?wpdmdl=89545 Device will reboot automatically after upgrade.",
"product_ids": [
"12"
],
"restart_required": {
"category": "system"
},
"url": "https://www.eurotherm.com/?wpdmdl=89545"
},
{
"category": "vendor_fix",
"details": "Version 1.2.1 of Vijeo Designer Basic includes a fix for these vulnerabilities. Please contact your Schneider Electric\u2019s Customer Care Center to obtain the installer. To complete the update, connect to Harmony HMI and download the firmware using Vijeo Designer Basic V1.2.1.",
"product_ids": [
"17",
"20"
],
"restart_required": {
"category": "none"
}
},
{
"category": "no_fix_planned",
"details": "The E+PLC100 product has reached its end of life and is no longer supported.",
"product_ids": [
"22"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the E+PLC100 device and any remote visualization workstations running the E+PLC tools.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"22"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.4.0.0 of the E+PLC400 firmware is available and includes a fix for these vulnerabilities. Please contact the Eurotherm Support team to obtain the firmware update. Please be sure to include the following when contacting the support team:\u2022 End Username, Company, and Email Address\u2022 Serial numbers of the devices to be upgraded\u2022 Current E+PLC400 firmware version",
"product_ids": [
"23"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.4.0.0 of the E+PLC400 firmware is available and includes a fix for these vulnerabilities. Please contact the Eurotherm Support team to obtain the firmware update. Please be sure to include the following when contacting the support team:\u2022 End Username, Company, and Email Address\u2022 Serial numbers of the devices to be upgraded\u2022 Current E+PLC400 firmware versionVersion 7.3 of the Eycon firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login",
"product_ids": [
"25"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 8.2 of the T2550 firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login ",
"product_ids": [
"27"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 6.3 of the T2750 firmware is available and includes a fix for these vulnerabilities. Access to the patch can be obtained through the following link:https://partners.eurotherm.com/member-login",
"product_ids": [
"29"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version 6.2 SP11 Multi HotFix 4 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. On the engineering workstation, update to V6.2 SP11 Multi HotFix 4 (or above) of Vijeo Designer.To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.2 SP11 Multi HotFix 4.",
"product_ids": [
"37",
"40",
"43"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 6.2 SP12 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. On the engineering workstation, update to V6.2 SP12 (or above) of Vijeo Designer. To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.2 SP12.",
"product_ids": [
"50"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 6.3 SP1 of Vijeo Designer includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application. https://www.se.com/ww/en/product-range/1054-vijeo-designer-hmi-software/#software-and-firmware On the engineering workstation, update to V6.3 SP1 (or above) of Vijeo Designer. To complete the update, connect to Harmony HMI and download the project file using Vijeo Designer V6.3 SP1.",
"product_ids": [
"57"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/1054-vijeo-designer-hmi-software/#software-and-firmware"
},
{
"category": "vendor_fix",
"details": "Versions B5.118, D1.92, D4.38, D5.25I and D6.18 of MiCOM C264 include a fix for these vulnerabilities and are available through Schneider Electric regional DPACs.",
"product_ids": [
"67",
"69",
"71",
"73",
"75"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 5.1.9.34 of Modicon M241/M251 Logic Controllers includes a fix for these vulnerabilities.On the engineering workstation, update to latest version of EcoStruxure Machine Expert: https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control To complete the update on Modicon M241/M251 Logic Controllers, update to firmware version V5.1.9.34 or higher available within EcoStruxure Machine Expert. A reboot is needed.",
"product_ids": [
"77",
"79"
],
"restart_required": {
"category": "system"
},
"url": "https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control"
},
{
"category": "vendor_fix",
"details": "Version 5.1.6.1 of Modicon M262 Logic Controllers includes a fix for these vulnerabilities.On the engineering workstation, update to latest version of EcoStruxure Machine Expert: https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-controlTo complete the update on Modicon M262 Logic Controllers, update to firmware version V5.1.6.1 or higher available within EcoStruxure Machine Expert. A reboot is needed.",
"product_ids": [
"81"
],
"restart_required": {
"category": "system"
},
"url": "https://www.se.com/ww/en/product-range/2226-ecostruxure-machine-expert-somachine/?parent-subcategory-id=5140\u0026filter=business-1-industrial-automation-and-control"
},
{
"category": "vendor_fix",
"details": "Firmware Version 5.0.4.18 of Modicon M258/LMC058 logic controllers includes a fix for these vulnerabilities and can be updated through Schneider Electric Software Update (SESU) application.",
"product_ids": [
"83",
"85"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 2.11 of BMXNOC0401 includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOC0401/",
"product_ids": [
"87"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOC0401/"
},
{
"category": "vendor_fix",
"details": "Version SV3.50 of BMXNOE0100 (H) includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXNOE0100_SV_03.50/",
"product_ids": [
"89"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXNOE0100_SV_03.50/"
},
{
"category": "vendor_fix",
"details": "Version SV6.70 of BMXNOE0110 (H) includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXNOE0110_SV_06.70/",
"product_ids": [
"91"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXNOE0110_SV_06.70/"
},
{
"category": "vendor_fix",
"details": "Version 1.7 IR24 of BMXNOR0200H includes a fix for thesevulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOR0200H/",
"product_ids": [
"93"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOR0200H/"
},
{
"category": "vendor_fix",
"details": "Version 3.50 of Modicon M340 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMXP34xxxxx_SV_03.50/ ",
"product_ids": [
"95"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMXP34xxxxx_SV_03.50/"
},
{
"category": "vendor_fix",
"details": "Version SV4.10 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/download/document/BMEx58x0x0_SV04.10/",
"product_ids": [
"97"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMEx58x0x0_SV04.10/"
},
{
"category": "vendor_fix",
"details": "Version SV4.21 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-range/62098-modicon-m580-pac-controller/#software-and-firmware Important: customer needs to use version of EcoStruxure\u2122 Control Expert V16.0 HF001 minimum to connect with the latest version of M580 CPU Safety. The software is available for download here: https://www.se.com/ww/en/product-range/548-ecostruxure-control-expert-unity-pro/#software-and-firmware",
"product_ids": [
"99"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/62098-modicon-m580-pac-controller/#software-and-firmware"
},
{
"category": "vendor_fix",
"details": "Version SV2.21 includes a fix for these vulnerabilities and is available for download here: BMENOC 0301 - https://www.se.com/ww/en/download/document/BMENOC0301_SV_02.21/",
"product_ids": [
"101"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0301_SV_02.21/"
},
{
"category": "vendor_fix",
"details": "Version SV2.21 includes a fix for these vulnerabilities and is available for download here: BMENOC 0311 -https://www.se.com/ww/en/download/document/BMENOC0311_SV_02.21",
"product_ids": [
"103"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0311_SV_02.21"
},
{
"category": "vendor_fix",
"details": "Version SV1.09 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMENOC0321_SV_01.09",
"product_ids": [
"105"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMENOC0321_SV_01.09"
},
{
"category": "vendor_fix",
"details": "Version SV1.5 of HART X80 Module includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/download/document/BMEAHO0412_Firmware_upgrade/",
"product_ids": [
"107",
"109"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/BMEAHO0412_Firmware_upgrade/"
},
{
"category": "vendor_fix",
"details": "Version 1.8 of MC80 Controller (BMKC80) includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-range/62396-modicon-mc80/#software-and-firmware",
"product_ids": [
"111"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-range/62396-modicon-mc80/#software-and-firmware"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations in the device user manual.\u2022 Setup a VPN between the Modicon PLC device and the remote engineering workstations.\u2022 Activate and apply user management and password features.\u2022 Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"113"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version SV2.6 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/download/document/Momentum_FW_update/ ",
"product_ids": [
"114"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/Momentum_FW_update/"
},
{
"category": "no_fix_planned",
"details": "Quantum and Premium offers have reached their end of life and are no longer supported.",
"product_ids": [
"116",
"117"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Setup a VPN between the Modicon PLC device and the remote engineering workstations.\u2022 Activate and apply user management and password features.\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering Modicon M580 ePAC.",
"product_ids": [
"116",
"117"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 1.60 of BMXNOM0200 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMXNOM0200/ ",
"product_ids": [
"118"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMXNOM0200/"
},
{
"category": "vendor_fix",
"details": "Version 1.04 of BMENOS0300 includes a fix for these vulnerabilities and is available for download here:https://www.se.com/ww/en/product/BMENOS0300/",
"product_ids": [
"120"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/BMENOS0300/"
},
{
"category": "vendor_fix",
"details": "Version 10.02 of nanodac includes a fix for this vulnerability and is available for download here: https://www.eurotherm.com/?wpdmdl=28419 Device will reboot automatically after upgrade.",
"product_ids": [
"122"
],
"restart_required": {
"category": "system"
},
"url": "https://www.eurotherm.com/?wpdmdl=28419"
},
{
"category": "vendor_fix",
"details": "Firmware Version 1.66.5.1 of PacDrive Eco/Pro/Pro2 Logic Controllers includes a fix for these vulnerabilities and can be updated through the Schneider Electric Software Update (SESU) application.",
"product_ids": [
"124",
"126",
"128"
],
"restart_required": {
"category": "none"
}
},
{
"category": "no_fix_planned",
"details": "PacDrive M Logic Controller has reached its end of life and is no longer supported.",
"product_ids": [
"130"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside,\u2022 Use firewalls to protect and separate the control system network from other networks,\u2022 Use VPN (Virtual Private Networks) tunnels if remote access is required,\u2022 Activate and apply user management and password features,\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering PacDrive Eco/Pro/Pro2 to resolve this issue.",
"product_ids": [
"130"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic ION7400 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/ION7400_meter_FW_v003.001.000/",
"product_ids": [
"131"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/ION7400_meter_FW_v003.001.000/"
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic PM8000 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/PM8000_meter_FW_v003.001.000/",
"product_ids": [
"133"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/PM8000_meter_FW_v003.001.000/"
},
{
"category": "vendor_fix",
"details": "Version 3.1 of PowerLogic ION9000 includes a fix for this vulnerability and is available for download here: https://www.se.com/ww/en/download/document/ION9000_meter_FW_v003.001.000/",
"product_ids": [
"135"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/ION9000_meter_FW_v003.001.000/"
},
{
"category": "mitigation",
"details": "If the update cannot be applied immediately, please follow the guidelines in Schneider Electric Recommended Cybersecurity Best Practices document to help mitigate the risk.",
"product_ids": [
"131",
"133",
"135"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version 4.09.350 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d).To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.350 or later.",
"product_ids": [
"151",
"152",
"153",
"154",
"155"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "vendor_fix",
"details": "Version 4.09.450 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d). To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.400 or later.",
"product_ids": [
"161"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "vendor_fix",
"details": "Version 4.09.400 of Pro-face GP-Pro EX includes a fix for these vulnerabilities and is available for download here: https://www.proface.com/en/download/trial/gpproex/v40 or update online via GP-Pro EX (refer to Help menu and select \u201cConfirm Update of GP-Pro EX\u201d). To complete the update, connect to Pro-face HMI and download the project file using GP-Pro EX V4.09.400 or later.",
"product_ids": [
"163",
"164"
],
"restart_required": {
"category": "none"
},
"url": "https://www.proface.com/en/download/trial/gpproex/v40"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the mitigations found in the Cybersecurity Reference Manual linked below to reduce the risk of exploit: https://www.se.com/ww/en/download/document/EIO0000001999/",
"product_ids": [
"167",
"168"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/EIO0000001999/"
},
{
"category": "vendor_fix",
"details": "Version SY-1101207, Version N of SCD6000 firmware includes a fix for this vulnerability. Contact your local Customer Support to receive this firmware version. Reboot is required after installation.",
"product_ids": [
"169"
],
"restart_required": {
"category": "system"
}
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here: https://www.sage-rtu.com/downloads.html Reboot of SAGE RTU is required after firmware upgrade.This fix applies a Wind River VxWorks (real-time operating system) patch to bring code libraries current to 6.9.4.12 RCPL3 revision. This corrects issues with overflow causing malloc/calloc to return valid pointer when it should return fail indication NULL pointer.",
"product_ids": [
"171"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
},
{
"category": "vendor_fix",
"details": "Version 2.43 of the Versadac scalable data recorder is available and includes a fix for these vulnerabilities.Access to the patch can be obtained through the following link: https://partners.eurotherm.com/member-login",
"product_ids": [
"173"
],
"restart_required": {
"category": "none"
},
"url": "https://partners.eurotherm.com/member-login"
},
{
"category": "vendor_fix",
"details": "Version SV02.80 of BMECRA31210, BMXCRA3120, BMXCRA31210 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMXCRA31210",
"product_ids": [
"175",
"177",
"179"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMXCRA31210"
},
{
"category": "vendor_fix",
"details": "Version V02.80 of 140CRA31200 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product/140CRA31200/quantum-rio-drop-e-ip-1ch",
"product_ids": [
"181"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/140CRA31200/quantum-rio-drop-e-ip-1ch"
},
{
"category": "vendor_fix",
"details": "Version V02.80 of 140CRA31908 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product/140CRA31908/m580-quantum-s908-rio-drop-adapter",
"product_ids": [
"183"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product/140CRA31908/m580-quantum-s908-rio-drop-adapter"
},
{
"category": "vendor_fix",
"details": "Version SV2.6 of BMENOP0300 includes a fix for these vulnerabilities and is available for download here: https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMENOP0300",
"product_ids": [
"185"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/product-country-selector/?pageType=product\u0026sourceId=BMENOP0300"
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the Modicon. Communication modules and the remote engineering workstations.\u2022 Activate and apply user management and password features.Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"187"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit: \u2022 Use relays only in a protected environment to minimize network exposure and ensure that they are not accessible from outside.\u2022 Disable unused network protocol interfaces.\u2022 Use firewalls to protect and separate the control system network from other networks.\u2022 Activate and apply user management and password features.\u2022 Limit the access to the system by physical means.",
"product_ids": [
"188",
"189"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the EPack device and any remote visualization workstations running iTools.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"190"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\u2022 Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\u2022 Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.When remote access is required, use secure methods, such as the Vijeo Connect.",
"product_ids": [
"191"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside,\u2022 Use firewalls to protect and separate the control system network from other networks,\u2022 Use VPN (Virtual Private Networks) tunnels if remote access is required,\u2022 Activate and apply user management and password features,\u2022 Limit the access to both development and control system by physical means, operating system features, etc.Customers should also consider upgrading to the latest product offering Modicon M262 to resolve this issue.",
"product_ids": [
"192"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the followingmitigations to reduce the risk of exploit:\u2022 Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\u2022 Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment,and networks.\u2022 Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\u2022 When remote access is required, use secure methods, such as the Pro-face Connect.Customers should also consider upgrading to the latest product offering to resolve this issue. Please contact your sales support about alternative products",
"product_ids": [
"193",
"194",
"195"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "Customers should immediately apply the following mitigations to reduce the risk of exploit:\u2022 Setup network segmentation and implement a firewall to block all unauthorized access to the device.\u2022 Configure the Access Control List following the recommendations of the device user manual.\u2022 Setup a VPN between the 6000-series device and any remote visualization workstations running Bridge.\u2022 Activate and apply user management and password features. Limit the access to both development and control system by physical means, operating system features, etc.",
"product_ids": [
"196",
"197",
"198",
"199",
"200"
],
"restart_required": {
"category": "none"
}
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1",
"3",
"5",
"7",
"8",
"10",
"12",
"17",
"20",
"22",
"23",
"25",
"27",
"29",
"37",
"40",
"43",
"50",
"57",
"67",
"69",
"71",
"73",
"75",
"77",
"79",
"81",
"83",
"85",
"87",
"89",
"91",
"93",
"95",
"97",
"99",
"101",
"103",
"105",
"107",
"109",
"111",
"113",
"114",
"116",
"117",
"118",
"120",
"122",
"124",
"126",
"128",
"130",
"131",
"133",
"135",
"151",
"152",
"153",
"154",
"155",
"161",
"163",
"164",
"167",
"168",
"169",
"171",
"173",
"175",
"177",
"179",
"181",
"183",
"185",
"187",
"188",
"189",
"190",
"191",
"192",
"193",
"194",
"195",
"196",
"197",
"198",
"199",
"200"
]
}
],
"title": "CVE-2020-28895"
},
{
"acknowledgments": [
{
"urls": [
"https://us-cert.cisa.gov/ics/advisories/icsa-21-119-04"
]
}
],
"cve": "CVE-2021-22156",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry\u00ae QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"66"
],
"known_affected": [
"64"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Updates have been released to address the identified vulnerability Customers are urged to upgrade to Niagara 4.10u1.\nThese updates are available on the Schneider Electric Exchange https://ecoxpert.se.com/ or by contacting your sales support channel or by contacting the Schneider Electric support team at productsupport.NAM-BMS@schneider-electric.com It is important that all TAC I/A Series Niagara customers for all supported platforms update their systems with these releases to mitigate risk. If you have any questions, please contact your Schneider Electric support team at productsupport.NAM-BMS@schneider-electric.com. As always, we highly recommend that TAC I/A Series Niagara customers running on an unsupported platform (such as Niagara G3/AX) take action to update their systems to a supported platform, ideally the 4.10u1 release of Niagara Framework. In addition to updating your system, Schneider Electric recommends that customers with affected products take the following steps to protect themselves:\n\u2022 Review and validate the list of users who are authorized and who can authenticate to Niagara.\n\u2022 Allow only trained and trusted persons to have physical access to the system, including devices that have connection to the system though the Ethernet port.\n\u2022 Consider using a VPN or other means to ensure secure remote connections into the network where the system is located, If remote connections are enabled.\n\u2022 Sign all modules and program objects provided by third-party teams. \nReview the Niagara Hardening Guide https://community.exchange.se.com/t5/Building-Automation-Knowledge/I-A-Series-Niagara-4-Hardening-Guide-Tips-to-Secure-an-I-A/ta-p/159287 for techniques on securing your installation.",
"product_ids": [
"64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"64"
]
}
],
"title": "CVE-2021-22156"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…