(I)IoT Security News
Cyber Security, DER, Vulnerabilities

Schneider Electric Security Notification12-Easergy T200 Multiple Vulnerabilities

The Easergy T200 RTU Product Line (T200I, T200E, T200P) is a modular platform for medium voltage and low voltage public distribution network management.

Easergy T200 Multiple Vulnerabilities

12 March 2024
Overview
Schneider Electric is aware of multiple vulnerabilities in its Easergy T200 products.
The Easergy T200 RTU Product Line (T200I, T200E, T200P) is a modular platform for medium
voltage and low voltage public distribution network management. Note, this product has been
obsoleted since December 31st, 2021, and is no longer available for purchase.
Failure to apply the remediations provided below may allow a brute force attack, which could
result in unauthorized data access, and/or compromise of the device

Affected Products and Models

Vulnerability Details
CVE ID: CVE-2024-2051
CVSS v3.1 Base Score 9.8 | Critical | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that
could cause account takeover and unauthorized access to the system when an attacker
conducts brute-force attacks against the login form.

CVE ID: CVE-2024-2050
CVSS v3.1 Base Score 8.2 | High| CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
vulnerability exists when an attacker injects then executes arbitrary malicious JavaScript code
within the context of the product.
CVE ID: CVE-2024-2052
CVSS v3.1 Base Score 7.5 | High | [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N]
CWE-552: Files or Directories Accessible to External Parties vulnerability exists that could allow
unauthenticated files and logs exfiltration and download of files when an attacker modifies the
URL to download to a different location.
Note regarding vulnerability details: The severity of vulnerabilities was calculated using the
CVSS Base metrics in version 3.1 (CVSS v3.1) without incorporating the Temporal and
Environmental metrics. Schneider Electric recommends that customers score the CVSS
Environmental metrics, which are specific to end-user organizations, and consider factors such
as the presence of mitigations in that environment. Environmental metrics may refine the
relative severity posed by the vulnerabilities described in this document within a customer’s
environment.

Remediation

After upgrade, the device will reboot automatically.
The firmware version is displayed in the “Communication Software Information” web page for
verification.
General Security Recommendations
We strongly recommend the following industry cybersecurity best practices.

Schneider Electric Security Notification

Acknowledgements
Schneider Electric recognizes the following researcher for identifying and helping to coordinate
a response to these vulnerabilities:

For More Information
This document provides an overview of the identified vulnerability or vulnerabilities and actions
required to mitigate. For more details and assistance on how to protect your installation, contact
your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity
Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be
fully aware of this situation and can support you through the process.
For further information related to cybersecurity in Schneider Electric’s products, visit the
company’s cybersecurity support portal page:
https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp

Source:

https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-072-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-072-01.pdf

Related posts

Siemens SCALANCE & SIMATIC

(I) IoT
5 years ago

Omron CX-Supervisor

(I) IoT
6 years ago

Siemens PROFINET-IO Stack (Update A)

(I) IoT
5 years ago
Exit mobile version