CVE-2020-7564
📋 TL;DR
This buffer overflow vulnerability in Schneider Electric Modicon PLC web servers allows attackers to execute arbitrary commands by uploading malicious files via FTP. It affects Modicon M340, Quantum, and Premium Legacy PLCs and their communication modules. Successful exploitation could give attackers full control over industrial control systems.
💻 Affected Systems
- Modicon M340
- Modicon Quantum
- Modicon Premium Legacy
- Communication Modules for these PLCs
📦 What is this software?
Modicon M340 Bmx Noc 0401 Firmware by Schneider Electric
View all CVEs affecting Modicon M340 Bmx Noc 0401 Firmware →
Modicon M340 Bmx Noe 0100 Firmware by Schneider Electric
View all CVEs affecting Modicon M340 Bmx Noe 0100 Firmware →
Modicon M340 Bmx Noe 0100h Firmware by Schneider Electric
View all CVEs affecting Modicon M340 Bmx Noe 0100h Firmware →
Modicon M340 Bmx Noe 0110 Firmware by Schneider Electric
View all CVEs affecting Modicon M340 Bmx Noe 0110 Firmware →
Modicon M340 Bmx Noe 0110h Firmware by Schneider Electric
View all CVEs affecting Modicon M340 Bmx Noe 0110h Firmware →
Modicon M340 Bmx Nor 0200h Firmware by Schneider Electric
View all CVEs affecting Modicon M340 Bmx Nor 0200h Firmware →
Modicon M340 Bmx P34 2010 Firmware by Schneider Electric
View all CVEs affecting Modicon M340 Bmx P34 2010 Firmware →
Modicon M340 Bmx P34 2030 Firmware by Schneider Electric
View all CVEs affecting Modicon M340 Bmx P34 2030 Firmware →
Modicon Quantum 140cpu65150 Firmware by Schneider Electric
View all CVEs affecting Modicon Quantum 140cpu65150 Firmware →
Modicon Quantum 140cpu65150c Firmware by Schneider Electric
View all CVEs affecting Modicon Quantum 140cpu65150c Firmware →
Modicon Quantum 140cpu65160 Firmware by Schneider Electric
View all CVEs affecting Modicon Quantum 140cpu65160 Firmware →
Modicon Quantum 140cpu65160c Firmware by Schneider Electric
View all CVEs affecting Modicon Quantum 140cpu65160c Firmware →
Modicon Quantum 140noc78100 Firmware by Schneider Electric
View all CVEs affecting Modicon Quantum 140noc78100 Firmware →
Modicon Quantum 140noe77101 Firmware by Schneider Electric
View all CVEs affecting Modicon Quantum 140noe77101 Firmware →
Modicon Quantum 140noe77111 Firmware by Schneider Electric
View all CVEs affecting Modicon Quantum 140noe77111 Firmware →
Modicon Tsxety4103 Firmware by Schneider Electric
Modicon Tsxety5103 Firmware by Schneider Electric
Modicon Tsxp574634 Firmware by Schneider Electric
Modicon Tsxp575634 Firmware by Schneider Electric
Modicon Tsxp576634 Firmware by Schneider Electric
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary commands, modify control logic, disrupt industrial processes, and potentially cause physical damage or safety incidents.
Likely Case
Unauthorized access to PLC systems, manipulation of industrial processes, data theft, and potential disruption of manufacturing or critical infrastructure operations.
If Mitigated
Limited impact if proper network segmentation, access controls, and monitoring are in place to detect and block malicious FTP activity.
🎯 Exploit Status
Exploitation requires FTP access to the PLC. No authentication is needed for the buffer overflow itself once FTP access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Schneider Electric security notification SEVD-2020-315-01 for specific firmware versions
Vendor Advisory: https://www.se.com/ww/en/download/document/SEVD-2020-315-01/
Restart Required: Yes
Instructions:
1. Download the updated firmware from Schneider Electric's website. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart the PLC. 5. Verify the update was successful.
🔧 Temporary Workarounds
Disable FTP Service
allDisable the FTP service on affected PLCs if not required for operations
Network Segmentation
allIsolate PLCs in separate network segments with strict firewall rules
🧯 If You Can't Patch
- Implement strict network access controls to limit FTP access to trusted IP addresses only
- Monitor FTP logs for unusual file uploads and implement intrusion detection for buffer overflow attempts
🔍 How to Verify
Check if Vulnerable:
Check if FTP service is enabled on Modicon PLCs and verify firmware version against Schneider Electric's advisory
Check Version:
Use Schneider Electric's programming software (Unity Pro, EcoStruxure Control Expert) to read PLC firmware version
Verify Fix Applied:
Verify firmware version has been updated to patched version and test that FTP service functions normally without allowing buffer overflow
📡 Detection & Monitoring
Log Indicators:
- Unusual FTP file uploads
- Large file uploads to PLC FTP server
- Failed buffer overflow attempts in system logs
Network Indicators:
- FTP connections from unauthorized sources
- Unusual FTP traffic patterns to PLCs
- Attempts to upload files with crafted payloads
SIEM Query:
source="ftp_logs" AND (dest_ip="PLC_IP" OR dest_ip="PLC_subnet") AND (file_size>threshold OR file_name CONTAINS suspicious_pattern)