Skip to main content

CVE-2025-3117: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Schneider Electric Modicon Controllers M241/M251

Medium
VulnerabilityCVE-2025-3117cvecve-2025-3117cwe-79
Published: Tue Jun 10 2025 (06/10/2025, 08:43:15 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: Modicon Controllers M241/M251

Description

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists impacting configuration file paths that could cause an unvalidated data injected by authenticated malicious user leading to modify or read data in a victim’s browser.

AI-Powered Analysis

AILast updated: 07/11/2025, 01:01:46 UTC

Technical Analysis

CVE-2025-3117 is a Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Schneider Electric Modicon Controllers M241 and M251, specifically versions prior to 5.3.12.51. The vulnerability arises from improper neutralization of input during web page generation, particularly involving configuration file paths. An authenticated malicious user can inject unvalidated data into the web interface, which is then executed in the victim's browser context. This flaw allows the attacker to modify or read data within the victim’s browser session, potentially leading to session hijacking, unauthorized actions, or data leakage. The vulnerability requires the attacker to have some level of authenticated access (privileged or user-level), and the victim must interact with the maliciously crafted content (user interaction required). The CVSS 4.0 base score is 5.1 (medium severity), reflecting a network attack vector with low attack complexity, no privileges required beyond authentication, and limited impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that mitigation may rely on vendor updates or configuration hardening. Given the critical role of Modicon controllers in industrial automation and control systems, exploitation could have operational consequences if leveraged in a targeted attack.

Potential Impact

For European organizations, especially those in industrial sectors such as manufacturing, energy, and critical infrastructure, this vulnerability poses a moderate risk. Modicon M241 and M251 controllers are widely used in automation processes, and compromise could lead to unauthorized manipulation or disclosure of control system data. While the vulnerability does not directly impact availability, the ability to execute scripts in a victim’s browser could facilitate further attacks, including credential theft or lateral movement within industrial networks. The requirement for authenticated access limits the attack surface but does not eliminate risk, particularly in environments with weak access controls or where user credentials might be phished or otherwise compromised. European entities operating Schneider Electric controllers should be aware that exploitation could disrupt operational technology (OT) environments, potentially impacting production continuity and safety. Additionally, regulatory frameworks such as NIS2 and GDPR emphasize the protection of critical infrastructure and personal data, making timely remediation essential to avoid compliance issues and reputational damage.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting authenticated user access to the web interface of Modicon controllers, enforcing strong authentication mechanisms and role-based access controls to minimize the risk of malicious input injection. 2. Network segmentation should be implemented to isolate industrial control systems from general IT networks and limit exposure to potential attackers. 3. Employ web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) capable of detecting and blocking XSS payloads targeting the controller interfaces. 4. Monitor logs and network traffic for unusual activities indicative of attempted exploitation, such as anomalous input patterns or repeated authentication failures. 5. Coordinate with Schneider Electric for timely updates and patches; once available, apply firmware or software updates to address the vulnerability. 6. Conduct security awareness training for personnel with access to these controllers to recognize phishing attempts or social engineering tactics that could lead to credential compromise. 7. Review and sanitize all user inputs in custom configurations or scripts interacting with the controllers to prevent injection of malicious data. 8. Consider deploying multi-factor authentication (MFA) for accessing controller management interfaces to add an additional security layer.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-04-02T12:30:28.927Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68487f561b0bd07c3938a493

Added to database: 6/10/2025, 6:54:14 PM

Last enriched: 7/11/2025, 1:01:46 AM

Last updated: 8/3/2025, 8:35:44 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats