Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Adapter for Modbus TCP

AVEVA Adapter for Modbus TCP Module

  • Last UpdatedFeb 20, 2025
  • 3 minute read

AVEVA Adapter for Modbus TCP Module: 1.6.0.354

AVEVA Adapter for Modbus TCP 1.6.0.354

Adapter Framework: 1.8.1.62

Edge Module Manager: 1.1.1.19

Alpine Linux: 3.18.4

Overview

AVEVA Adapter for Modbus TCP Module collects time series data and relevant metadata from Modbus TCP devices and sends it to configured OMF endpoints such as PI Web API and AVEVA Data Hub. AVEVA Adapter for Modbus TCP Module can also collect health and diagnostics information. It supports buffering, polled data collection, and various Windows and Linux-based operating systems as well as containerization.

For more information, see Overview.

Fixes and enhancements

Fixes

Existing issues that were resolved in this release:

  • The adapter no longer enters an infinite loop when configuring the RegisterOffset as 65,535

  • Fixed excessive reconnection attempts when losing connection to a data source in some cases

Enhancements

New functionality or enhancements that were addressed in this release:

  • Adapter now supports client failover

  • Multiple selection items can now reference the same register offsets

  • RegisterOffset can now be specified as a hexadecimal value

  • Added support for UInt32 data types

  • Removed hostname and IP information from logs unless using debug level or lower

  • Visual C++ Redistributable files are now included in the Windows installer

  • Renamed product to AVEVA Adapter for Modbus TCP Module

Known issues

There are no known issues at this time.

Setup

System requirements

Refer to System requirements.

Installation and upgrade

Refer to Install the adapter and Special considerations for upgrading existing installations.

Uninstallation

Refer to Uninstall the adapter.

Security information and guidance

We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.

We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.

No security-related information is applicable to this release.

Overview of New Vulnerabilities Found or Fixed

This section is intended to provide relevant security-related information to guide your installation or upgrade decision. AVEVA is proactively disclosing aggregate information about the number and severity of AVEVA Adapter for Modbus TCP Module security vulnerabilities that are fixed in this release.

For this release of AVEVA Adapter for Modbus TCP Module , the following vulnerabilities have been identified or fixed.

Security vulnerabilities fixed in AVEVA Adapter for Modbus TCP Module 1.6.0.354

Severity Category

CVSS Base Score Range

Number of Fixed Vulnerabilities

Critical

9 - 10

0

High

7.0 - 8.9

1

Medium

4.0 - 6.9

0

Low

0 - 3.9

0

Vulnerability Mitigations in AVEVA Adapter for Modbus TCP Module 1.6.0.354

The following vulnerabilities were identified in AVEVA Adapter for Modbus TCP Module 1.6.0.354 release.

Component

Version

CVE or Reference

CVSS

Mitigation

zlib

1.2.13

CVE-2023-45853 (https://nvd.nist.gov/vuln/detail/CVE-2023-45853)

9.8

Vulnerability is not applicable:

The AVEVA Adapter for Modbus TCP Module's utilization of zlib through .NET 6 does not expose this vulnerability.

.NET

6.0.27

CVE-2023-36038 (https://nvd.nist.gov/vuln/detail/CVE-2023-36038)

7.5

Vulnerability is not applicable:

The AVEVA Adapter for Modbus TCP Module does not use .NET 8 RC1, .NET 8 RC2 or any preview release of .NET 8 affected by this vulnerability.

.NET

6.0.27

CVE-2024-21392 (https://nvd.nist.gov/vuln/detail/CVE-2024-21392)

7.5

Vulnerability is not applicable:

The AVEVA Adapter for Modbus TCP Module uses .NET 6 which is not affected by this vulnerability.

rust-mio

0.8.8

CVE-2024-27308 (https://nvd.nist.gov/vuln/detail/CVE-2024-27308)

Not yet assessed

Vulnerability is not applicable:

mio is only used as a dependency of Tokio. rodbus 1.3.1 uses Tokio 1.29.1 which is unaffected by this vulnerability.

Documentation overview

EdgeCmd utility: Provides an overview on how to configure and administer AVEVA adapters on Linux and Windows using command line arguments.

Technical support and resources

Refer to Technical support and feedback.

In This Topic
Related Links
TitleResults for “How to create a CRG?”Also Available in