(I)IoT Security News
Critical vulnerabiliities, ICS, IoT Security, Market, News

Schneider Electric EcoStruxure Products, Modicon PLCs, and Programmable Automation Controllers


Security Assessment of Schneider Electric Products

Summary of Findings: During a security assessment of Schneider Electric’s EcoStruxure Products, Modicon PLCs, and Programmable Automation Controllers, several vulnerabilities were discovered. These vulnerabilities involve improper checks for unusual or exceptional conditions and could potentially lead to unauthorized access, execution of arbitrary code, or denial-of-service attacks.

Affected Products and Firmware Versions: The following products and their corresponding firmware versions are affected:

Details of Vulnerability: The identified vulnerability, CWE-754 (Improper Check for Unusual or Exceptional Conditions), can result in arbitrary code execution, denial-of-service, and compromise of confidentiality and integrity. The vulnerability is tracked with CVE-2022-45788 and has a CVSS v3 base score of 7.5.

Mitigations and Fixes: Schneider Electric has released patches and remediations to address these vulnerabilities:

Implementation and Best Practices: Users are advised to apply the provided patches using appropriate patching methodologies. Schneider Electric recommends evaluating the impact of updates in a testing and development environment or on an offline infrastructure. For assistance in removing a patch if necessary, users can contact Schneider Electric.

Network Security Recommendations: To minimize the risk of exploitation, follow best practices for network hardening. Use firewalls to isolate control system networks and employ secure methods like virtual private networks (VPNs) for remote access.

CISA Recommendations: The Cybersecurity and Infrastructure Security Agency (CISA) suggests organizations perform impact analysis and risk assessment before deploying defensive measures. CISA also provides additional resources on its ICS webpage at cisa.gov/ics, including detailed cyber defense best practices.

Researcher Information: The vulnerabilities were reported by Jos Wetzels and Daniel dos Santos of Forescout Technologies.

In conclusion, Schneider Electric has taken prompt action to address the identified vulnerabilities. Users should apply the provided patches and adhere to cybersecurity best practices to protect their systems from potential attacks.


Source:
https://www.cisa.gov/news-events/ics-advisories/icsa-23-201-01

Related posts

Cisco Firepower Management Center Software Log API Denial of Service Vulnerability

(I) IoT
1 year ago

Siemens SINAMICS

(I) IoT
5 years ago

Siemens SCALANCE W1750D

(I) IoT
3 years ago
Exit mobile version