CVE-2020-7475

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to inject malicious code into Schneider Electric PLC controllers through improper input validation in engineering software. It affects EcoStruxure Control Expert, Unity Pro, and Modicon M340/M580 controllers. Successful exploitation could enable remote code execution on industrial control systems.

💻 Affected Systems

Products:
  • EcoStruxure Control Expert
  • Unity Pro
  • Modicon M340
  • Modicon M580
Versions: All versions prior to Control Expert 14.1 Hot Fix, Unity Pro all versions, M340 prior to V3.20, M580 prior to V3.10
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires engineering software access to transfer code to controllers; affects both programming software and PLC firmware.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems leading to physical process disruption, equipment damage, or safety incidents through malicious code execution on PLCs.

🟠

Likely Case

Unauthorized access to PLC logic, manipulation of industrial processes, or installation of persistent malware in control systems.

🟢

If Mitigated

Limited impact through network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires access to engineering software and network connectivity to controllers; reflective DLL injection technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Control Expert 14.1 Hot Fix, M340 V3.20, M580 V3.10

Vendor Advisory: http://www.se.com/ww/en/download/document/SEVD-2020-080-01

Restart Required: Yes

Instructions:

1. Download patches from Schneider Electric security advisory. 2. Apply Control Expert hot fix. 3. Update M340 firmware to V3.20. 4. Update M580 firmware to V3.10. 5. Restart affected systems.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLC networks from engineering stations and corporate networks

Access Control

windows

Restrict engineering software access to authorized personnel only

🧯 If You Can't Patch

  • Implement strict network segmentation between engineering workstations and PLC controllers
  • Apply principle of least privilege to engineering software access and monitor for unauthorized transfers

🔍 How to Verify

Check if Vulnerable:

Check software versions: Control Expert < 14.1 Hot Fix, M340 firmware < V3.20, M580 firmware < V3.10

Check Version:

In Control Expert: Help → About; For PLCs: Connect and check firmware version in programming software

Verify Fix Applied:

Confirm Control Expert version includes hot fix, M340 firmware ≥ V3.20, M580 firmware ≥ V3.10

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized engineering software access
  • Unexpected code transfers to PLCs
  • Failed authentication attempts to engineering stations

Network Indicators:

  • Unexpected traffic between engineering stations and PLCs
  • Protocol anomalies in Modbus/TCP communications

SIEM Query:

source="engineering_station" AND dest="plc_network" AND (action="code_transfer" OR protocol="modbus")

🔗 References

📤 Share & Export