CVE-2025-13901: CWE-404 Improper Resource Shutdown or Release in Schneider Electric Modicon M241/M251
CWE-404 Improper Resource Shutdown or Release vulnerability exists that could cause partial Denial of Service on Machine Expert protocol when an unauthenticated attacker sends malicious payload to occupy active communication channels.
AI Analysis
Technical Summary
CVE-2025-13901 is a vulnerability classified under CWE-404 (Improper Resource Shutdown or Release) affecting Schneider Electric's Modicon M241 and M251 PLCs, specifically versions prior to 5.4.13.12. The flaw arises from the improper handling of communication channel resources within the Machine Expert protocol stack. An unauthenticated attacker can exploit this by sending specially crafted malicious payloads that occupy active communication channels, preventing legitimate communication and causing a partial denial of service. This resource exhaustion disrupts the PLC's ability to process normal commands, potentially halting or degrading industrial automation processes controlled by these devices. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. Although no public exploits are currently known, the vulnerability's presence in widely deployed industrial control hardware makes it a significant concern. The CVSS 4.0 base score is 6.9, reflecting medium severity due to network attack vector, low attack complexity, and no privileges or user interaction required. The vulnerability does not affect confidentiality or integrity directly but impacts availability by causing service disruption. Schneider Electric has addressed this issue in firmware version 5.4.13.12 and later. Organizations using affected PLCs should prioritize patching and consider additional network-level protections to mitigate exploitation risks.
Potential Impact
The primary impact of CVE-2025-13901 is a partial denial of service on Schneider Electric Modicon M241/M251 PLCs, which are critical components in industrial automation and control systems. Disruption of communication channels can lead to halted or degraded control processes, affecting manufacturing lines, critical infrastructure, and industrial operations. This can result in operational downtime, financial losses, and potential safety hazards in environments relying on continuous and reliable PLC operation. Since the vulnerability requires no authentication and can be exploited remotely, attackers could disrupt operations without insider access. While it does not directly compromise data confidentiality or integrity, the availability impact can cascade into broader operational and safety risks. The lack of known exploits reduces immediate threat but does not eliminate the risk, especially as threat actors may develop exploits targeting industrial control systems. Organizations with large deployments of Schneider Electric PLCs are particularly vulnerable to targeted attacks aiming to disrupt industrial processes.
Mitigation Recommendations
To mitigate CVE-2025-13901, organizations should immediately upgrade affected Modicon M241 and M251 PLCs to firmware version 5.4.13.12 or later where the vulnerability is patched. In addition to patching, implement strict network segmentation to isolate industrial control systems from general IT networks and the internet, reducing exposure to unauthenticated remote attacks. Deploy network monitoring and anomaly detection tools focused on the Machine Expert protocol to identify unusual communication channel usage indicative of exploitation attempts. Limit access to PLC communication ports using firewalls and access control lists (ACLs) to restrict traffic to trusted sources only. Regularly audit and review PLC configurations and network architecture to ensure adherence to security best practices. Establish incident response procedures specific to industrial control system disruptions to minimize downtime if exploitation occurs. Finally, maintain up-to-date asset inventories to quickly identify and remediate vulnerable devices.
Affected Countries
United States, Germany, France, China, Japan, South Korea, Brazil, United Kingdom, Italy, Canada
CVE-2025-13901: CWE-404 Improper Resource Shutdown or Release in Schneider Electric Modicon M241/M251
Description
CWE-404 Improper Resource Shutdown or Release vulnerability exists that could cause partial Denial of Service on Machine Expert protocol when an unauthenticated attacker sends malicious payload to occupy active communication channels.
AI-Powered Analysis
Technical Analysis
CVE-2025-13901 is a vulnerability classified under CWE-404 (Improper Resource Shutdown or Release) affecting Schneider Electric's Modicon M241 and M251 PLCs, specifically versions prior to 5.4.13.12. The flaw arises from the improper handling of communication channel resources within the Machine Expert protocol stack. An unauthenticated attacker can exploit this by sending specially crafted malicious payloads that occupy active communication channels, preventing legitimate communication and causing a partial denial of service. This resource exhaustion disrupts the PLC's ability to process normal commands, potentially halting or degrading industrial automation processes controlled by these devices. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. Although no public exploits are currently known, the vulnerability's presence in widely deployed industrial control hardware makes it a significant concern. The CVSS 4.0 base score is 6.9, reflecting medium severity due to network attack vector, low attack complexity, and no privileges or user interaction required. The vulnerability does not affect confidentiality or integrity directly but impacts availability by causing service disruption. Schneider Electric has addressed this issue in firmware version 5.4.13.12 and later. Organizations using affected PLCs should prioritize patching and consider additional network-level protections to mitigate exploitation risks.
Potential Impact
The primary impact of CVE-2025-13901 is a partial denial of service on Schneider Electric Modicon M241/M251 PLCs, which are critical components in industrial automation and control systems. Disruption of communication channels can lead to halted or degraded control processes, affecting manufacturing lines, critical infrastructure, and industrial operations. This can result in operational downtime, financial losses, and potential safety hazards in environments relying on continuous and reliable PLC operation. Since the vulnerability requires no authentication and can be exploited remotely, attackers could disrupt operations without insider access. While it does not directly compromise data confidentiality or integrity, the availability impact can cascade into broader operational and safety risks. The lack of known exploits reduces immediate threat but does not eliminate the risk, especially as threat actors may develop exploits targeting industrial control systems. Organizations with large deployments of Schneider Electric PLCs are particularly vulnerable to targeted attacks aiming to disrupt industrial processes.
Mitigation Recommendations
To mitigate CVE-2025-13901, organizations should immediately upgrade affected Modicon M241 and M251 PLCs to firmware version 5.4.13.12 or later where the vulnerability is patched. In addition to patching, implement strict network segmentation to isolate industrial control systems from general IT networks and the internet, reducing exposure to unauthenticated remote attacks. Deploy network monitoring and anomaly detection tools focused on the Machine Expert protocol to identify unusual communication channel usage indicative of exploitation attempts. Limit access to PLC communication ports using firewalls and access control lists (ACLs) to restrict traffic to trusted sources only. Regularly audit and review PLC configurations and network architecture to ensure adherence to security best practices. Establish incident response procedures specific to industrial control system disruptions to minimize downtime if exploitation occurs. Finally, maintain up-to-date asset inventories to quickly identify and remediate vulnerable devices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- schneider
- Date Reserved
- 2025-12-02T16:20:27.551Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b05633ea502d3aa87d6b90
Added to database: 3/10/2026, 5:34:43 PM
Last enriched: 3/10/2026, 6:08:54 PM
Last updated: 3/13/2026, 9:51:14 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.