Skip to main content

CVE-2025-2875: CWE-610 Externally Controlled Reference to a Resource in Another Sphere in Schneider Electric Modicon Controllers M241 / M251

High
VulnerabilityCVE-2025-2875cvecve-2025-2875cwe-610
Published: Wed May 14 2025 (05/14/2025, 08:46:19 UTC)
Source: CVE
Vendor/Project: Schneider Electric
Product: Modicon Controllers M241 / M251

Description

CWE-610: Externally Controlled Reference to a Resource in Another Sphere vulnerability exists that could cause a loss of confidentiality when an unauthenticated attacker manipulates controller’s webserver URL to access resources.

AI-Powered Analysis

AILast updated: 07/06/2025, 16:27:30 UTC

Technical Analysis

CVE-2025-2875 is a high-severity vulnerability identified in Schneider Electric's Modicon Controllers M241 and M251, specifically affecting versions prior to v5.3.12.48. The vulnerability is classified under CWE-610, which refers to an Externally Controlled Reference to a Resource in Another Sphere. This type of vulnerability occurs when an application or device allows external input to control references to resources outside the intended security domain, potentially enabling unauthorized access. In this case, the Modicon controllers' embedded webserver improperly handles URL inputs, allowing an unauthenticated attacker to manipulate the URL to access resources that should be restricted. This manipulation can lead to a loss of confidentiality, as sensitive information or system resources may be exposed without requiring authentication or user interaction. The CVSS 4.0 base score is 8.7, indicating a high severity level. The vector string (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) shows that the attack can be performed remotely over the network with low attack complexity, no privileges, no authentication, and no user interaction required. The vulnerability impacts the confidentiality of the system with a high impact, while integrity and availability are not affected. No known exploits are currently reported in the wild, but the ease of exploitation and the critical nature of the affected devices make this a significant threat. Modicon M241 and M251 controllers are widely used in industrial control systems (ICS) for automation in manufacturing, energy, and infrastructure sectors, making this vulnerability particularly concerning for operational technology (OT) environments.

Potential Impact

For European organizations, the impact of CVE-2025-2875 can be substantial, especially those operating critical infrastructure, manufacturing plants, energy grids, and other industrial environments relying on Schneider Electric Modicon controllers. The loss of confidentiality could lead to exposure of sensitive operational data, system configurations, or intellectual property, potentially enabling further targeted attacks or industrial espionage. Since these controllers are integral to automation and control processes, unauthorized access could also undermine trust in system integrity and safety, even if direct integrity or availability impacts are not evident from this vulnerability alone. The fact that exploitation requires no authentication and can be performed remotely increases the risk of widespread attacks, particularly in environments where these controllers are accessible from less secure network segments or the internet. European organizations with interconnected IT and OT networks may face increased risk of lateral movement by attackers exploiting this vulnerability. Additionally, regulatory frameworks such as NIS2 and GDPR emphasize the protection of critical infrastructure and personal data, so exploitation could lead to compliance violations and significant financial and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-2875 effectively, European organizations should: 1) Immediately identify and inventory all Schneider Electric Modicon M241 and M251 controllers in their environment, focusing on versions prior to v5.3.12.48. 2) Apply the vendor-provided patches or firmware updates as soon as they become available; if patches are not yet released, implement compensating controls such as network segmentation to isolate affected controllers from untrusted networks. 3) Restrict access to the controllers' webserver interfaces by implementing strict firewall rules and access control lists (ACLs), allowing only trusted management stations or networks. 4) Employ network monitoring and intrusion detection systems (IDS) tuned to detect anomalous URL requests or unusual access patterns targeting these controllers. 5) Conduct regular security assessments and penetration testing focused on OT environments to identify and remediate similar vulnerabilities proactively. 6) Educate operational staff about the risks of exposing control system interfaces and enforce policies to prevent direct internet exposure of critical OT devices. 7) Collaborate with Schneider Electric support channels to receive timely updates and guidance on vulnerability management. These measures go beyond generic advice by emphasizing immediate inventory, network-level protections, and active monitoring tailored to the specific nature of this vulnerability and the affected devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-03-27T15:03:20.150Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecadf

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 4:27:30 PM

Last updated: 7/27/2025, 4:46:49 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats