Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Adapter for Modbus TCP

AVEVA Adapter for Modbus TCP Module 1​.6 release notes

AVEVA Adapter for Modbus TCP Module 1​.6 release notes

  • Last UpdatedJan 29, 2026
  • 3 minute read

AVEVA Adapter for Modbus TCP Module 1.6, released July 2024, is a containerized version of the adapter that can be deployed using Edge Management on CONNECT data services. It offers the same capabilities as the adapter that is available for installation directly on the device.

The 1.6 Module release uses Version 1.6.0.354 of the Modbus TCP adapter, Version 1.8.1.62 of the Adapter Framework, Version 1.1.1.19 of the Edge Module Manager, and Version 3.18.4 of Alpine Linux.

For more information on product features and functions, refer to the following sections:

  • Prerequisites and system requirements

  • Installation/uninstallation instructions

refer to AVEVA Adapter for Modbus TCP.

The latest information about the 1.6 release is available online on the AVEVA Documentation Portal.

New features and enhancements

The following items were added in this release:

  • Adapter now supports client failover

  • Multiple selection items can now reference the same register offsets

  • RegisterOffset can now be specified as a hexadecimal value

  • Added support for UInt32 data types

  • Removed hostname and IP information from logs unless using debug level or lower

  • Visual C++ Redistributable files are now included in the Windows installer

  • Renamed product to AVEVA Adapter for Modbus TCP Module

Resolved issues

Existing issues that were resolved in this release:

  • The adapter no longer enters an infinite loop when configuring the RegisterOffset as 65,535

  • Fixed excessive reconnection attempts when losing connection to a data source in some cases

Known issues

There are no known issues for this release.

Security information and guidance

We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.

We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.

Overview of New Vulnerabilities Found or Fixed

This section is intended to provide relevant security-related information to guide your installation or upgrade decision. AVEVA is proactively disclosing aggregate information about the number and severity of AVEVA Adapter for Modbus TCP Module security vulnerabilities that are fixed in this release.

For this release of AVEVA Adapter for Modbus TCP Module, the following vulnerabilities have been identified or fixed.

Security vulnerabilities fixed in AVEVA Adapter for Modbus TCP Module 1.6.0.354

Severity Category

CVSS Base Score Range

Number of Fixed Vulnerabilities

Critical

9 - 10

0

High

7.0 - 8.9

1

Medium

4.0 - 6.9

0

Low

0 - 3.9

0

Vulnerability Mitigations in AVEVA Adapter for Modbus TCP Module 1.6.0.354

The following vulnerabilities were identified in AVEVA Adapter for Modbus TCP Module 1.6.0.354 release.

Component

Version

CVE or Reference

CVSS

Mitigation

zlib

1.2.13

CVE-2023-45853 (https://nvd.nist.gov/vuln/detail/CVE-2023-45853)

9.8

Vulnerability is not applicable:

The AVEVA Adapter for Modbus TCP Module's utilization of zlib through .NET 6 does not expose this vulnerability.

.NET

6.0.27

CVE-2023-36038 (https://nvd.nist.gov/vuln/detail/CVE-2023-36038)

7.5

Vulnerability is not applicable:

The AVEVA Adapter for Modbus TCP Module does not use .NET 8 RC1, .NET 8 RC2 or any preview release of .NET 8 affected by this vulnerability.

.NET

6.0.27

CVE-2024-21392 (https://nvd.nist.gov/vuln/detail/CVE-2024-21392)

7.5

Vulnerability is not applicable:

The AVEVA Adapter for Modbus TCP Module uses .NET 6 which is not affected by this vulnerability.

rust-mio

0.8.8

CVE-2024-27308 (https://nvd.nist.gov/vuln/detail/CVE-2024-27308)

Not yet assessed

Vulnerability is not applicable:

mio is only used as a dependency of Tokio. rodbus 1.3.1 uses Tokio 1.29.1 which is unaffected by this vulnerability.

TitleResults for “How to create a CRG?”Also Available in