AVEVA Adapter for Modbus TCP Module
- Last UpdatedFeb 20, 2025
- 3 minute read
AVEVA Adapter for Modbus TCP Module: 1.6.0.354
AVEVA Adapter for Modbus TCP 1.6.0.354
Adapter Framework: 1.8.1.62
Edge Module Manager: 1.1.1.19
Alpine Linux: 3.18.4
Overview
AVEVA Adapter for Modbus TCP Module collects time series data and relevant metadata from Modbus TCP devices and sends it to configured OMF endpoints such as PI Web API and AVEVA Data Hub. AVEVA Adapter for Modbus TCP Module can also collect health and diagnostics information. It supports buffering, polled data collection, and various Windows and Linux-based operating systems as well as containerization.
For more information, see Overview.
Fixes and enhancements
Fixes
Existing issues that were resolved in this release:
-
The adapter no longer enters an infinite loop when configuring the RegisterOffset as 65,535
-
Fixed excessive reconnection attempts when losing connection to a data source in some cases
Enhancements
New functionality or enhancements that were addressed in this release:
-
Adapter now supports client failover
-
Multiple selection items can now reference the same register offsets
-
RegisterOffset can now be specified as a hexadecimal value
-
Added support for UInt32 data types
-
Removed hostname and IP information from logs unless using debug level or lower
-
Visual C++ Redistributable files are now included in the Windows installer
-
Renamed product to AVEVA Adapter for Modbus TCP Module
Known issues
There are no known issues at this time.
Setup
System requirements
Refer to System requirements.
Installation and upgrade
Refer to Install the adapter and Special considerations for upgrading existing installations.
Uninstallation
Refer to Uninstall the adapter.
Security information and guidance
We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.
We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.
No security-related information is applicable to this release.
Overview of New Vulnerabilities Found or Fixed
This section is intended to provide relevant security-related information to guide your installation or upgrade decision. AVEVA is proactively disclosing aggregate information about the number and severity of AVEVA Adapter for Modbus TCP Module security vulnerabilities that are fixed in this release.
For this release of AVEVA Adapter for Modbus TCP Module , the following vulnerabilities have been identified or fixed.
Security vulnerabilities fixed in AVEVA Adapter for Modbus TCP Module 1.6.0.354
|
Severity Category |
CVSS Base Score Range |
Number of Fixed Vulnerabilities |
|---|---|---|
|
Critical |
9 - 10 |
0 |
|
High |
7.0 - 8.9 |
1 |
|
Medium |
4.0 - 6.9 |
0 |
|
Low |
0 - 3.9 |
0 |
Vulnerability Mitigations in AVEVA Adapter for Modbus TCP Module 1.6.0.354
The following vulnerabilities were identified in AVEVA Adapter for Modbus TCP Module 1.6.0.354 release.
|
Component |
Version |
CVE or Reference |
CVSS |
Mitigation |
|---|---|---|---|---|
|
zlib |
1.2.13 |
CVE-2023-45853 (https://nvd.nist.gov/vuln/detail/CVE-2023-45853) |
9.8 |
Vulnerability is not applicable: The AVEVA Adapter for Modbus TCP Module's utilization of zlib through .NET 6 does not expose this vulnerability. |
|
.NET |
6.0.27 |
CVE-2023-36038 (https://nvd.nist.gov/vuln/detail/CVE-2023-36038) |
7.5 |
Vulnerability is not applicable: The AVEVA Adapter for Modbus TCP Module does not use .NET 8 RC1, .NET 8 RC2 or any preview release of .NET 8 affected by this vulnerability. |
|
.NET |
6.0.27 |
CVE-2024-21392 (https://nvd.nist.gov/vuln/detail/CVE-2024-21392) |
7.5 |
Vulnerability is not applicable: The AVEVA Adapter for Modbus TCP Module uses .NET 6 which is not affected by this vulnerability. |
|
rust-mio |
0.8.8 |
CVE-2024-27308 (https://nvd.nist.gov/vuln/detail/CVE-2024-27308) |
Not yet assessed |
Vulnerability is not applicable: mio is only used as a dependency of Tokio. rodbus 1.3.1 uses Tokio 1.29.1 which is unaffected by this vulnerability. |
Documentation overview
EdgeCmd utility: Provides an overview on how to configure and administer AVEVA adapters on Linux and Windows using command line arguments.
Technical support and resources
Refer to Technical support and feedback.