Skip to main content

CVE-2022-0222: CWE-269 Improper Privilege Management in Schneider Electric Modicon M340 CPUs

High
VulnerabilityCVE-2022-0222cvecve-2022-0222cwe-269
Published: Tue Nov 22 2022 (11/22/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Schneider Electric
Product: Modicon M340 CPUs

Description

A CWE-269: Improper Privilege Management vulnerability exists that could cause a denial of service of the Ethernet communication of the controller when sending a specific request over SNMP. Affected products: Modicon M340 CPUs(BMXP34* versions prior to V3.40), Modicon M340 X80 Ethernet Communication modules:BMXNOE0100 (H), BMXNOE0110 (H), BMXNOR0200H RTU(BMXNOE* all versions)(BMXNOR* versions prior to v1.7 IR24)

AI-Powered Analysis

AILast updated: 06/25/2025, 01:04:21 UTC

Technical Analysis

CVE-2022-0222 is a high-severity vulnerability (CVSS 7.5) classified under CWE-269: Improper Privilege Management, affecting Schneider Electric's Modicon M340 series programmable logic controllers (PLCs) and associated Ethernet communication modules. Specifically, the affected products include Modicon M340 CPUs (BMXP34* versions prior to V3.40), Modicon M340 X80 Ethernet Communication modules (BMXNOE0100 (H), BMXNOE0110 (H)), and BMXNOR0200H RTU modules (BMXNOE* all versions and BMXNOR* versions prior to v1.7 IR24). The vulnerability arises from improper privilege management that allows an unauthenticated attacker to send a specially crafted SNMP request to the controller, resulting in a denial of service (DoS) condition that disrupts Ethernet communication of the controller. This disruption can halt industrial control processes relying on these PLCs, potentially causing operational downtime. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit remotely. The impact is limited to availability (A:H) with no direct confidentiality or integrity compromise. No known exploits have been reported in the wild to date, and no official patches are linked in the provided data, indicating that mitigation may rely on configuration changes or vendor updates. The vulnerability affects critical industrial control hardware widely used in manufacturing, energy, and infrastructure sectors, where Modicon M340 PLCs are deployed for automation and control tasks. The improper privilege management flaw indicates that the SNMP service on these devices does not sufficiently restrict access, allowing malicious requests to disrupt normal operations.

Potential Impact

For European organizations, especially those in industrial sectors such as manufacturing, energy production, water treatment, and critical infrastructure, this vulnerability poses a significant risk of operational disruption. The Modicon M340 series PLCs are commonly used in automation systems across Europe, and a denial of service on Ethernet communication can halt production lines, cause safety system failures, or interrupt utility services. Given the network-based nature of the attack and lack of required authentication, attackers could remotely trigger outages without insider access. This could lead to financial losses due to downtime, safety hazards if control systems fail, and reputational damage. Additionally, disruption in critical infrastructure could have cascading effects on supply chains and public services. Although no confidentiality or integrity impact is noted, the availability impact alone is critical in industrial environments where continuous operation is essential. The lack of known exploits in the wild suggests the threat is currently theoretical but should be treated proactively to avoid future exploitation.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Modicon M340 PLCs and their communication modules from general enterprise networks and restrict SNMP traffic to trusted management stations only. 2. Implement strict access control lists (ACLs) on network devices to block unauthorized SNMP requests to the affected devices. 3. Disable SNMP services on the Modicon M340 devices if not required for operational monitoring. 4. Monitor network traffic for unusual SNMP requests or spikes that could indicate exploitation attempts. 5. Apply any available firmware or software updates from Schneider Electric as soon as they are released, even if not explicitly linked here, by regularly checking vendor advisories. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tuned for SNMP-based attacks targeting industrial control systems. 7. Conduct regular security audits and penetration tests focusing on industrial control system networks to identify and remediate similar privilege management issues. 8. Develop and test incident response plans specifically for industrial control system availability disruptions to minimize downtime impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2022-01-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeebd9

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 1:04:21 AM

Last updated: 7/30/2025, 12:37:29 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats