Skip to main content

CVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340

High
VulnerabilityCVE-2025-6625cvecve-2025-6625cwe-20
Published: Mon Aug 18 2025 (08/18/2025, 06:58:15 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: Modicon M340

Description

CWE-20: Improper Input Validation vulnerability exists that could cause a Denial Of Service when specific crafted FTP command is sent to the device.

AI-Powered Analysis

AILast updated: 08/18/2025, 07:32:47 UTC

Technical Analysis

CVE-2025-6625 is a high-severity vulnerability identified in Schneider Electric's Modicon M340 programmable logic controller (PLC) product line. The root cause of this vulnerability is improper input validation (CWE-20) in the device's FTP service. Specifically, the device fails to properly validate crafted FTP commands sent to it, which can trigger a Denial of Service (DoS) condition. This means an unauthenticated attacker with network access to the device's FTP service can send specially crafted commands that cause the device to crash, reboot, or become unresponsive, disrupting its normal operation. The vulnerability affects all versions of the Modicon M340, indicating a systemic issue in the FTP command processing logic. The CVSS 4.0 base score of 8.7 reflects the vulnerability's high impact and ease of exploitation: it requires no privileges, no user interaction, and can be exploited remotely over the network. The impact on confidentiality and integrity is rated low, but the impact on availability is high due to the DoS nature of the flaw. No known exploits are currently reported in the wild, and no patches have been published yet, increasing the urgency for affected organizations to monitor for updates and implement mitigations. The Modicon M340 is widely used in industrial control systems (ICS) for automation in critical infrastructure sectors such as manufacturing, energy, and utilities, making this vulnerability particularly concerning for operational technology (OT) environments.

Potential Impact

For European organizations, the impact of CVE-2025-6625 could be significant, especially those operating critical infrastructure and industrial automation systems that rely on Schneider Electric's Modicon M340 PLCs. A successful DoS attack could halt production lines, disrupt energy distribution, or impair water treatment processes, leading to operational downtime, financial losses, and potential safety hazards. Given the high availability requirements of industrial environments, even short outages can have cascading effects on supply chains and service delivery. Furthermore, the lack of authentication and user interaction requirements means attackers could exploit this vulnerability remotely, increasing the risk of widespread disruption. European organizations in sectors such as manufacturing, utilities, transportation, and energy are particularly at risk. The vulnerability also raises concerns about compliance with EU regulations on critical infrastructure protection and cybersecurity, such as the NIS Directive and the Cybersecurity Act.

Mitigation Recommendations

Since no patches are currently available, European organizations should implement immediate compensating controls to reduce exposure. These include: 1) Network segmentation and strict access controls to isolate Modicon M340 devices from general IT networks and restrict FTP access to trusted management stations only. 2) Deploy network-level filtering and intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious or malformed FTP traffic targeting the PLCs. 3) Disable or restrict FTP services on the devices if operationally feasible, or replace FTP with more secure protocols where possible. 4) Implement strict monitoring and logging of network traffic to detect anomalous FTP commands or repeated connection attempts. 5) Develop and test incident response plans specific to ICS DoS scenarios to minimize downtime and recovery time. 6) Maintain close communication with Schneider Electric for timely patch releases and apply updates as soon as they become available. 7) Conduct regular security assessments and penetration testing focused on OT environments to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-06-25T10:08:00.547Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a2d394ad5a09ad00a8e851

Added to database: 8/18/2025, 7:17:40 AM

Last enriched: 8/18/2025, 7:32:47 AM

Last updated: 8/18/2025, 11:03:20 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats