Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13901: CWE-404 Improper Resource Shutdown or Release in Schneider Electric Modicon M241/M251

0
Medium
VulnerabilityCVE-2025-13901cvecve-2025-13901cwe-404
Published: Tue Mar 10 2026 (03/10/2026, 17:02:22 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: Modicon M241/M251

Description

CWE-404 Improper Resource Shutdown or Release vulnerability exists that could cause partial Denial of Service on Machine Expert protocol when an unauthenticated attacker sends malicious payload to occupy active communication channels.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:08:54 UTC

Technical Analysis

CVE-2025-13901 is a vulnerability classified under CWE-404 (Improper Resource Shutdown or Release) affecting Schneider Electric's Modicon M241 and M251 PLCs, specifically versions prior to 5.4.13.12. The flaw arises from the improper handling of communication channel resources within the Machine Expert protocol stack. An unauthenticated attacker can exploit this by sending specially crafted malicious payloads that occupy active communication channels, preventing legitimate communication and causing a partial denial of service. This resource exhaustion disrupts the PLC's ability to process normal commands, potentially halting or degrading industrial automation processes controlled by these devices. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. Although no public exploits are currently known, the vulnerability's presence in widely deployed industrial control hardware makes it a significant concern. The CVSS 4.0 base score is 6.9, reflecting medium severity due to network attack vector, low attack complexity, and no privileges or user interaction required. The vulnerability does not affect confidentiality or integrity directly but impacts availability by causing service disruption. Schneider Electric has addressed this issue in firmware version 5.4.13.12 and later. Organizations using affected PLCs should prioritize patching and consider additional network-level protections to mitigate exploitation risks.

Potential Impact

The primary impact of CVE-2025-13901 is a partial denial of service on Schneider Electric Modicon M241/M251 PLCs, which are critical components in industrial automation and control systems. Disruption of communication channels can lead to halted or degraded control processes, affecting manufacturing lines, critical infrastructure, and industrial operations. This can result in operational downtime, financial losses, and potential safety hazards in environments relying on continuous and reliable PLC operation. Since the vulnerability requires no authentication and can be exploited remotely, attackers could disrupt operations without insider access. While it does not directly compromise data confidentiality or integrity, the availability impact can cascade into broader operational and safety risks. The lack of known exploits reduces immediate threat but does not eliminate the risk, especially as threat actors may develop exploits targeting industrial control systems. Organizations with large deployments of Schneider Electric PLCs are particularly vulnerable to targeted attacks aiming to disrupt industrial processes.

Mitigation Recommendations

To mitigate CVE-2025-13901, organizations should immediately upgrade affected Modicon M241 and M251 PLCs to firmware version 5.4.13.12 or later where the vulnerability is patched. In addition to patching, implement strict network segmentation to isolate industrial control systems from general IT networks and the internet, reducing exposure to unauthenticated remote attacks. Deploy network monitoring and anomaly detection tools focused on the Machine Expert protocol to identify unusual communication channel usage indicative of exploitation attempts. Limit access to PLC communication ports using firewalls and access control lists (ACLs) to restrict traffic to trusted sources only. Regularly audit and review PLC configurations and network architecture to ensure adherence to security best practices. Establish incident response procedures specific to industrial control system disruptions to minimize downtime if exploitation occurs. Finally, maintain up-to-date asset inventories to quickly identify and remediate vulnerable devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
schneider
Date Reserved
2025-12-02T16:20:27.551Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b05633ea502d3aa87d6b90

Added to database: 3/10/2026, 5:34:43 PM

Last enriched: 3/10/2026, 6:08:54 PM

Last updated: 3/13/2026, 9:51:14 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses