(I)IoT Security News
ICS, News, Vulnerabilities

Schneider Electric Easergy T300

Edit withBrizy Save draft Preview Publish 33/100 Add title Schneider Electric Easergy T300

1. EXECUTIVE SUMMARY

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to obtain unauthorized access to the internal product LAN, which could result in exposure of sensitive information, denial of service, and remote code execution when access to a resource from an attacker is not restricted or incorrectly restricted.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Schneider Electric reports this vulnerability affects the following firmware versions of the Easergy T300 products:

3.2 VULNERABILITY OVERVIEW

3.2.1    MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306

The affected product is vulnerable to a missing authentication for critical function vulnerability, which may allow an attacker to expose information, cause a denial-of-service condition, and remotely execute arbitrary code.

CVE-2020-7561 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H).

3.2.2    MISSING AUTHORIZATION CWE-862

The affected product is vulnerable to a missing authorization vulnerability, which may allow an attacker to gain access to sensitive information, cause a denial-of-service condition, and remotely execute arbitrary code when access control checks are not applied consistently.

CVE-2020-28215 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H).

3.2.3    MISSING ENCRYPTION OF SENSITIVE DATA CWE-311

The affected product is vulnerable to a missing encryption of sensitive data vulnerability, which may allow an attacker to read network traffic over HTTP protocol.

CVE-2020-28216 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

3.2.4    MISSING ENCRYPTION OF SENSITIVE DATA CWE-311

The affected product is vulnerable to a missing encryption of sensitive data vulnerability, which may allow an attacker to read network traffic over IEC60870-5-104 protocol.

CVE-2020-28217 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L).

3.2.5    IMPROPER RESTRICTION OF RENDERED UI LAYERS OR FRAMES CWE-1021

The affected product is vulnerable due to an improper restriction of rendered UI layers or frames vulnerability, which may allow an attacker to trick a user into initiating an unintended action.

CVE-2020-28218 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L).

3.3 BACKGROUND

3.4 RESEARCHER

Evgeniy Druzhinin and IIya Karpov of Rostelecom-Solar and an anonymous researcher reported these vulnerabilities to Schneider Electric.

4. MITIGATIONS

Schneider Electric recommends users upgrade to v2.7.1, which is available from the Schneider Electric Customer Care Center. Alternatively, users may disable port forwarding in the product firewall.

Schneider Electric strongly recommends the following industry cybersecurity best practices:

Refer to Schneider Electric’s security bulletin SEVD-2020-315-06 for specific mitigation details.

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on us-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.

No known public exploits specifically target this vulnerability. High skill level is needed to exploit.

Source:

https://us-cert.cisa.gov/ics/advisories/icsa-20-343-03

Related posts

Sony addresses remotely exploitable flaws in Sony IPELA E Network Cameras

(I) IoT
6 years ago

Siemens devices using the PROFINET Discovery and Configuration Protocol (Update P)

(I) IoT
5 years ago

Siemens Energy PLUSCONTROL 1st Gen

(I) IoT
3 years ago
Exit mobile version