CVE-2025-2875: CWE-610 Externally Controlled Reference to a Resource in Another Sphere in Schneider Electric Modicon Controllers M241 / M251
CWE-610: Externally Controlled Reference to a Resource in Another Sphere vulnerability exists that could cause a loss of confidentiality when an unauthenticated attacker manipulates controller’s webserver URL to access resources.
AI Analysis
Technical Summary
CVE-2025-2875 is a high-severity vulnerability identified in Schneider Electric's Modicon Controllers M241 and M251, specifically affecting versions prior to v5.3.12.48. The vulnerability is classified under CWE-610, which refers to an Externally Controlled Reference to a Resource in Another Sphere. This type of vulnerability occurs when an application or device allows external input to control references to resources outside the intended security domain, potentially enabling unauthorized access. In this case, the Modicon controllers' embedded webserver improperly handles URL inputs, allowing an unauthenticated attacker to manipulate the URL to access resources that should be restricted. This manipulation can lead to a loss of confidentiality, as sensitive information or system resources may be exposed without requiring authentication or user interaction. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector string (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) shows that the attack can be performed remotely over the network with low attack complexity, no privileges, no authentication, and no user interaction required. The vulnerability impacts the confidentiality of the system with a high impact, while integrity and availability are not affected. No known exploits are currently reported in the wild, but the ease of exploitation and the critical nature of the affected devices make this a significant threat. Modicon M241 and M251 controllers are widely used in industrial control systems (ICS) for automation in manufacturing, energy, and infrastructure sectors, making this vulnerability particularly concerning for operational technology (OT) environments.
Potential Impact
For European organizations, the impact of CVE-2025-2875 can be substantial, especially those operating critical infrastructure, manufacturing plants, energy grids, and other industrial environments relying on Schneider Electric Modicon controllers. The loss of confidentiality could lead to exposure of sensitive operational data, system configurations, or intellectual property, potentially enabling further targeted attacks or industrial espionage. Since these controllers are integral to automation and control processes, unauthorized access could also undermine trust in system integrity and safety, even if direct integrity or availability impacts are not evident from this vulnerability alone. The fact that exploitation requires no authentication and can be performed remotely increases the risk of widespread attacks, particularly in environments where these controllers are accessible from less secure network segments or the internet. European organizations with interconnected IT and OT networks may face increased risk of lateral movement by attackers exploiting this vulnerability. Additionally, regulatory frameworks such as NIS2 and GDPR emphasize the protection of critical infrastructure and personal data, so exploitation could lead to compliance violations and significant financial and reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-2875 effectively, European organizations should: 1) Immediately identify and inventory all Schneider Electric Modicon M241 and M251 controllers in their environment, focusing on versions prior to v5.3.12.48. 2) Apply the vendor-provided patches or firmware updates as soon as they become available; if patches are not yet released, implement compensating controls such as network segmentation to isolate affected controllers from untrusted networks. 3) Restrict access to the controllers' webserver interfaces by implementing strict firewall rules and access control lists (ACLs), allowing only trusted management stations or networks. 4) Employ network monitoring and intrusion detection systems (IDS) tuned to detect anomalous URL requests or unusual access patterns targeting these controllers. 5) Conduct regular security assessments and penetration testing focused on OT environments to identify and remediate similar vulnerabilities proactively. 6) Educate operational staff about the risks of exposing control system interfaces and enforce policies to prevent direct internet exposure of critical OT devices. 7) Collaborate with Schneider Electric support channels to receive timely updates and guidance on vulnerability management. These measures go beyond generic advice by emphasizing immediate inventory, network-level protections, and active monitoring tailored to the specific nature of this vulnerability and the affected devices.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Sweden, Czech Republic
CVE-2025-2875: CWE-610 Externally Controlled Reference to a Resource in Another Sphere in Schneider Electric Modicon Controllers M241 / M251
Description
CWE-610: Externally Controlled Reference to a Resource in Another Sphere vulnerability exists that could cause a loss of confidentiality when an unauthenticated attacker manipulates controller’s webserver URL to access resources.
AI-Powered Analysis
Technical Analysis
CVE-2025-2875 is a high-severity vulnerability identified in Schneider Electric's Modicon Controllers M241 and M251, specifically affecting versions prior to v5.3.12.48. The vulnerability is classified under CWE-610, which refers to an Externally Controlled Reference to a Resource in Another Sphere. This type of vulnerability occurs when an application or device allows external input to control references to resources outside the intended security domain, potentially enabling unauthorized access. In this case, the Modicon controllers' embedded webserver improperly handles URL inputs, allowing an unauthenticated attacker to manipulate the URL to access resources that should be restricted. This manipulation can lead to a loss of confidentiality, as sensitive information or system resources may be exposed without requiring authentication or user interaction. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector string (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) shows that the attack can be performed remotely over the network with low attack complexity, no privileges, no authentication, and no user interaction required. The vulnerability impacts the confidentiality of the system with a high impact, while integrity and availability are not affected. No known exploits are currently reported in the wild, but the ease of exploitation and the critical nature of the affected devices make this a significant threat. Modicon M241 and M251 controllers are widely used in industrial control systems (ICS) for automation in manufacturing, energy, and infrastructure sectors, making this vulnerability particularly concerning for operational technology (OT) environments.
Potential Impact
For European organizations, the impact of CVE-2025-2875 can be substantial, especially those operating critical infrastructure, manufacturing plants, energy grids, and other industrial environments relying on Schneider Electric Modicon controllers. The loss of confidentiality could lead to exposure of sensitive operational data, system configurations, or intellectual property, potentially enabling further targeted attacks or industrial espionage. Since these controllers are integral to automation and control processes, unauthorized access could also undermine trust in system integrity and safety, even if direct integrity or availability impacts are not evident from this vulnerability alone. The fact that exploitation requires no authentication and can be performed remotely increases the risk of widespread attacks, particularly in environments where these controllers are accessible from less secure network segments or the internet. European organizations with interconnected IT and OT networks may face increased risk of lateral movement by attackers exploiting this vulnerability. Additionally, regulatory frameworks such as NIS2 and GDPR emphasize the protection of critical infrastructure and personal data, so exploitation could lead to compliance violations and significant financial and reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-2875 effectively, European organizations should: 1) Immediately identify and inventory all Schneider Electric Modicon M241 and M251 controllers in their environment, focusing on versions prior to v5.3.12.48. 2) Apply the vendor-provided patches or firmware updates as soon as they become available; if patches are not yet released, implement compensating controls such as network segmentation to isolate affected controllers from untrusted networks. 3) Restrict access to the controllers' webserver interfaces by implementing strict firewall rules and access control lists (ACLs), allowing only trusted management stations or networks. 4) Employ network monitoring and intrusion detection systems (IDS) tuned to detect anomalous URL requests or unusual access patterns targeting these controllers. 5) Conduct regular security assessments and penetration testing focused on OT environments to identify and remediate similar vulnerabilities proactively. 6) Educate operational staff about the risks of exposing control system interfaces and enforce policies to prevent direct internet exposure of critical OT devices. 7) Collaborate with Schneider Electric support channels to receive timely updates and guidance on vulnerability management. These measures go beyond generic advice by emphasizing immediate inventory, network-level protections, and active monitoring tailored to the specific nature of this vulnerability and the affected devices.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- schneider
- Date Reserved
- 2025-03-27T15:03:20.150Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecadf
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 7/6/2025, 4:27:30 PM
Last updated: 1/7/2026, 4:24:22 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.