AVEVA Adapter for Modbus TCP Module 1.6 release notes
- Last UpdatedJan 29, 2026
- 3 minute read
AVEVA Adapter for Modbus TCP Module 1.6, released July 2024, is a containerized version of the adapter that can be deployed using Edge Management on CONNECT data services. It offers the same capabilities as the adapter that is available for installation directly on the device.
The 1.6 Module release uses Version 1.6.0.354 of the Modbus TCP adapter, Version 1.8.1.62 of the Adapter Framework, Version 1.1.1.19 of the Edge Module Manager, and Version 3.18.4 of Alpine Linux.
For more information on product features and functions, refer to the following sections:
-
Prerequisites and system requirements
-
Installation/uninstallation instructions
refer to AVEVA Adapter for Modbus TCP.
The latest information about the 1.6 release is available online on the AVEVA Documentation Portal.
New features and enhancements
The following items were added in this release:
-
Adapter now supports client failover
-
Multiple selection items can now reference the same register offsets
-
RegisterOffset can now be specified as a hexadecimal value
-
Added support for UInt32 data types
-
Removed hostname and IP information from logs unless using debug level or lower
-
Visual C++ Redistributable files are now included in the Windows installer
-
Renamed product to AVEVA Adapter for Modbus TCP Module
Resolved issues
Existing issues that were resolved in this release:
-
The adapter no longer enters an infinite loop when configuring the RegisterOffset as 65,535
-
Fixed excessive reconnection attempts when losing connection to a data source in some cases
Known issues
There are no known issues for this release.
Security information and guidance
We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.
We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.
Overview of New Vulnerabilities Found or Fixed
This section is intended to provide relevant security-related information to guide your installation or upgrade decision. AVEVA is proactively disclosing aggregate information about the number and severity of AVEVA Adapter for Modbus TCP Module security vulnerabilities that are fixed in this release.
For this release of AVEVA Adapter for Modbus TCP Module, the following vulnerabilities have been identified or fixed.
Security vulnerabilities fixed in AVEVA Adapter for Modbus TCP Module 1.6.0.354
|
Severity Category |
CVSS Base Score Range |
Number of Fixed Vulnerabilities |
|---|---|---|
|
Critical |
9 - 10 |
0 |
|
High |
7.0 - 8.9 |
1 |
|
Medium |
4.0 - 6.9 |
0 |
|
Low |
0 - 3.9 |
0 |
Vulnerability Mitigations in AVEVA Adapter for Modbus TCP Module 1.6.0.354
The following vulnerabilities were identified in AVEVA Adapter for Modbus TCP Module 1.6.0.354 release.
|
Component |
Version |
CVE or Reference |
CVSS |
Mitigation |
|---|---|---|---|---|
|
zlib |
1.2.13 |
CVE-2023-45853 (https://nvd.nist.gov/vuln/detail/CVE-2023-45853) |
9.8 |
Vulnerability is not applicable: The AVEVA Adapter for Modbus TCP Module's utilization of zlib through .NET 6 does not expose this vulnerability. |
|
.NET |
6.0.27 |
CVE-2023-36038 (https://nvd.nist.gov/vuln/detail/CVE-2023-36038) |
7.5 |
Vulnerability is not applicable: The AVEVA Adapter for Modbus TCP Module does not use .NET 8 RC1, .NET 8 RC2 or any preview release of .NET 8 affected by this vulnerability. |
|
.NET |
6.0.27 |
CVE-2024-21392 (https://nvd.nist.gov/vuln/detail/CVE-2024-21392) |
7.5 |
Vulnerability is not applicable: The AVEVA Adapter for Modbus TCP Module uses .NET 6 which is not affected by this vulnerability. |
|
rust-mio |
0.8.8 |
CVE-2024-27308 (https://nvd.nist.gov/vuln/detail/CVE-2024-27308) |
Not yet assessed |
Vulnerability is not applicable: mio is only used as a dependency of Tokio. rodbus 1.3.1 uses Tokio 1.29.1 which is unaffected by this vulnerability. |