(I)IoT Security News
Cyber Security, DER, Vulnerabilities

Schneider Electric Security Notification-Vijeo Designer

Schneider Electric Security Notification Vijeo Designer

Schneider Electric Security Notification Vijeo Designer

10 September 2024
Overview
Schneider Electric is aware of a vulnerability in its Vijeo Designer product. The Vijeo Designer product is HMI Configuration Software compatible with Harmony and Magelis HMI. Vijeo Designer software offers functions such as multimedia capabilities and remote access for more efficiency.
Failure to apply the remediations provided below may risk privilege escalation, which could result in unauthorized access to workstation resources.

Affected Products and Versions

Vulnerability Details
CVE ID: CVE-2024-8306
CVSS v3.1 Base Score 7.8 | High | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-269: Improper Privilege Management vulnerability exists that could cause unauthorized
access, loss of confidentiality, integrity and availability of the workstation when non-admin
authenticated user tries to perform privilege escalation by tampering with the binaries.


Note regarding vulnerability details: The severity of vulnerabilities was calculated using the
CVSS Base metrics in version 3.1 (CVSS v3.1) without incorporating the Temporal and
Environmental metrics. Schneider Electric recommends that customers score the CVSS
Environmental metrics, which are specific to end-user organizations, and consider factors such
as the presence of mitigations in that environment. Environmental metrics may refine the
relative severity posed by the vulnerabilities described in this document within a customer’s
environment.

Remediation

Customers should use appropriate patching methodologies when applying these patches to their systems. We strongly recommend the use of back-ups and evaluating the impact of these patches in a Test and Development environment or on an offline infrastructure. Contact Schneider Electric’s Customer Care Center if you need assistance removing a patch. If customers choose not to apply the remediation provided above, they should immediately apply the following mitigations to reduce the risk of exploit:

Mitigations

To ensure you are informed of all updates, including details on affected products and
remediation plans, subscribe to Schneider Electric’s security notification service here:
https://www.se.com/en/work/support/cybersecurity/security-notifications.jsp

General Security Recommendations
We strongly recommend the following industry cybersecurity best practices.

For more information refer to the Schneider Electric Recommended Cybersecurity Best
Practices document.

Acknowledgements
Schneider Electric recognizes the following researcher for identifying and helping to coordinate
a response to this vulnerability:

For More Information
This document provides an overview of the identified vulnerability or vulnerabilities and actions
required to mitigate. For more details and assistance on how to protect your installation, contactmyour local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process.
For further information related to cybersecurity in Schneider Electric’s products, visit the
company’s cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp

Source:

https://download.schneider-electric.com/doc/SEVD-2024-254-01/SEVD-2024-254-01.pdf

Related posts

Delta Industrial Automation DIAEnergie

IoT
2 years ago

CODESYS Control V2 Linux SysFile library

(I) IoT
3 years ago

Emerson OpenEnterprise

(I) IoT
5 years ago
Exit mobile version