CVE-2022-0222: CWE-269 Improper Privilege Management in Schneider Electric Modicon M340 CPUs
A CWE-269: Improper Privilege Management vulnerability exists that could cause a denial of service of the Ethernet communication of the controller when sending a specific request over SNMP. Affected products: Modicon M340 CPUs(BMXP34* versions prior to V3.40), Modicon M340 X80 Ethernet Communication modules:BMXNOE0100 (H), BMXNOE0110 (H), BMXNOR0200H RTU(BMXNOE* all versions)(BMXNOR* versions prior to v1.7 IR24)
AI Analysis
Technical Summary
CVE-2022-0222 is a high-severity vulnerability (CVSS 7.5) classified under CWE-269: Improper Privilege Management, affecting Schneider Electric's Modicon M340 series programmable logic controllers (PLCs) and associated Ethernet communication modules. Specifically, the affected products include Modicon M340 CPUs (BMXP34* versions prior to V3.40), Modicon M340 X80 Ethernet Communication modules (BMXNOE0100 (H), BMXNOE0110 (H)), and BMXNOR0200H RTU modules (BMXNOE* all versions and BMXNOR* versions prior to v1.7 IR24). The vulnerability arises from improper privilege management that allows an unauthenticated attacker to send a specially crafted SNMP request to the controller, resulting in a denial of service (DoS) condition that disrupts Ethernet communication of the controller. This disruption can halt industrial control processes relying on these PLCs, potentially causing operational downtime. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit remotely. The impact is limited to availability (A:H) with no direct confidentiality or integrity compromise. No known exploits have been reported in the wild to date, and no official patches are linked in the provided data, indicating that mitigation may rely on configuration changes or vendor updates. The vulnerability affects critical industrial control hardware widely used in manufacturing, energy, and infrastructure sectors, where Modicon M340 PLCs are deployed for automation and control tasks. The improper privilege management flaw indicates that the SNMP service on these devices does not sufficiently restrict access, allowing malicious requests to disrupt normal operations.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy production, water treatment, and critical infrastructure, this vulnerability poses a significant risk of operational disruption. The Modicon M340 series PLCs are commonly used in automation systems across Europe, and a denial of service on Ethernet communication can halt production lines, cause safety system failures, or interrupt utility services. Given the network-based nature of the attack and lack of required authentication, attackers could remotely trigger outages without insider access. This could lead to financial losses due to downtime, safety hazards if control systems fail, and reputational damage. Additionally, disruption in critical infrastructure could have cascading effects on supply chains and public services. Although no confidentiality or integrity impact is noted, the availability impact alone is critical in industrial environments where continuous operation is essential. The lack of known exploits in the wild suggests the threat is currently theoretical but should be treated proactively to avoid future exploitation.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Modicon M340 PLCs and their communication modules from general enterprise networks and restrict SNMP traffic to trusted management stations only. 2. Implement strict access control lists (ACLs) on network devices to block unauthorized SNMP requests to the affected devices. 3. Disable SNMP services on the Modicon M340 devices if not required for operational monitoring. 4. Monitor network traffic for unusual SNMP requests or spikes that could indicate exploitation attempts. 5. Apply any available firmware or software updates from Schneider Electric as soon as they are released, even if not explicitly linked here, by regularly checking vendor advisories. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tuned for SNMP-based attacks targeting industrial control systems. 7. Conduct regular security audits and penetration tests focusing on industrial control system networks to identify and remediate similar privilege management issues. 8. Develop and test incident response plans specifically for industrial control system availability disruptions to minimize downtime impact.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Sweden, Czech Republic
CVE-2022-0222: CWE-269 Improper Privilege Management in Schneider Electric Modicon M340 CPUs
Description
A CWE-269: Improper Privilege Management vulnerability exists that could cause a denial of service of the Ethernet communication of the controller when sending a specific request over SNMP. Affected products: Modicon M340 CPUs(BMXP34* versions prior to V3.40), Modicon M340 X80 Ethernet Communication modules:BMXNOE0100 (H), BMXNOE0110 (H), BMXNOR0200H RTU(BMXNOE* all versions)(BMXNOR* versions prior to v1.7 IR24)
AI-Powered Analysis
Technical Analysis
CVE-2022-0222 is a high-severity vulnerability (CVSS 7.5) classified under CWE-269: Improper Privilege Management, affecting Schneider Electric's Modicon M340 series programmable logic controllers (PLCs) and associated Ethernet communication modules. Specifically, the affected products include Modicon M340 CPUs (BMXP34* versions prior to V3.40), Modicon M340 X80 Ethernet Communication modules (BMXNOE0100 (H), BMXNOE0110 (H)), and BMXNOR0200H RTU modules (BMXNOE* all versions and BMXNOR* versions prior to v1.7 IR24). The vulnerability arises from improper privilege management that allows an unauthenticated attacker to send a specially crafted SNMP request to the controller, resulting in a denial of service (DoS) condition that disrupts Ethernet communication of the controller. This disruption can halt industrial control processes relying on these PLCs, potentially causing operational downtime. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit remotely. The impact is limited to availability (A:H) with no direct confidentiality or integrity compromise. No known exploits have been reported in the wild to date, and no official patches are linked in the provided data, indicating that mitigation may rely on configuration changes or vendor updates. The vulnerability affects critical industrial control hardware widely used in manufacturing, energy, and infrastructure sectors, where Modicon M340 PLCs are deployed for automation and control tasks. The improper privilege management flaw indicates that the SNMP service on these devices does not sufficiently restrict access, allowing malicious requests to disrupt normal operations.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy production, water treatment, and critical infrastructure, this vulnerability poses a significant risk of operational disruption. The Modicon M340 series PLCs are commonly used in automation systems across Europe, and a denial of service on Ethernet communication can halt production lines, cause safety system failures, or interrupt utility services. Given the network-based nature of the attack and lack of required authentication, attackers could remotely trigger outages without insider access. This could lead to financial losses due to downtime, safety hazards if control systems fail, and reputational damage. Additionally, disruption in critical infrastructure could have cascading effects on supply chains and public services. Although no confidentiality or integrity impact is noted, the availability impact alone is critical in industrial environments where continuous operation is essential. The lack of known exploits in the wild suggests the threat is currently theoretical but should be treated proactively to avoid future exploitation.
Mitigation Recommendations
1. Immediate network segmentation: Isolate Modicon M340 PLCs and their communication modules from general enterprise networks and restrict SNMP traffic to trusted management stations only. 2. Implement strict access control lists (ACLs) on network devices to block unauthorized SNMP requests to the affected devices. 3. Disable SNMP services on the Modicon M340 devices if not required for operational monitoring. 4. Monitor network traffic for unusual SNMP requests or spikes that could indicate exploitation attempts. 5. Apply any available firmware or software updates from Schneider Electric as soon as they are released, even if not explicitly linked here, by regularly checking vendor advisories. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tuned for SNMP-based attacks targeting industrial control systems. 7. Conduct regular security audits and penetration tests focusing on industrial control system networks to identify and remediate similar privilege management issues. 8. Develop and test incident response plans specifically for industrial control system availability disruptions to minimize downtime impact.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- schneider
- Date Reserved
- 2022-01-13T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbeebd9
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/25/2025, 1:04:21 AM
Last updated: 7/30/2025, 12:37:29 AM
Views: 14
Related Threats
CVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumCVE-2025-55726
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.