PatchSiren cyber security CVE debrief
CVE-2026-0667 Schneider Electric CVE debrief
Schneider Electric and CISA describe CVE-2026-0667 as a critical CWE-754 improper-check flaw affecting SCADAPack 47x/47xi and RemoteConnect when communicating over Modbus TCP. The vendor says the issue could lead to arbitrary code execution, denial of service, and loss of confidentiality and integrity, and recommends upgrading to the fixed releases or applying OT segmentation, RTU firewall restrictions, and disabling the logic debug service.
- Vendor
- Schneider Electric
- Product
- SCADAPackā¢
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-02-10
- Original CVE updated
- 2026-03-17
- Advisory published
- 2026-02-10
- Advisory updated
- 2026-03-17
Who should care
OT/ICS operators, plant engineers, and security teams running Schneider Electric SCADAPack 47x/47xi or RemoteConnect, especially where Modbus TCP is reachable from less-trusted networks.
Technical summary
The advisory identifies a CWE-754 improper check for unusual or exceptional conditions in Modbus TCP handling. According to the source, this can affect confidentiality, integrity, availability, and may permit arbitrary code execution or denial of service. Vendor-fixed releases are SCADAPack 47x/47xi firmware 9.12.2 on SCADAPack 47x/47xi version R3.4.2, and RemoteConnect R3.4.2.
Defensive priority
Critical. Prioritize patching or controlled upgrade planning immediately, then reduce exposure with network segmentation and service hardening if remediation will be delayed.
Recommended defensive actions
- Upgrade SCADAPack 47x/47xi to firmware 9.12.2 on R3.4.2.
- Upgrade RemoteConnect to R3.4.2.
- If you cannot remediate immediately, follow the SCADAPack Cybersecurity Guide section 8.3 on secured communication.
- Segment OT networks and use the RTU firewall service to block unauthorized access to services.
- Disable the logic debug service where it is not required.
- Verify asset inventory for affected SCADAPack and RemoteConnect deployments and prioritize reachable Modbus TCP paths.
Evidence notes
CISA's CSAF advisory ICSA-26-076-02, republished from Schneider Electric's SEVD-2026-041-01 notice, lists affected SCADAPack 47x and 47xi firmware / R3.4.2 combinations and RemoteConnect, describes the flaw as CWE-754 over Modbus TCP, and provides vendor fixes plus mitigations. The advisory revision history shows the initial release on 2026-02-10 and CISA republication on 2026-03-17.
Official resources
-
CVE-2026-0667 CVE record
CVE.org
-
CVE-2026-0667 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Initial public advisory date: 2026-02-10; CISA republication/update date: 2026-03-17.