Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Schneider Electric Fixes Potential RCE Flaw in Several Products

Several solutions from Schneider Electric are plagued by a serious vulnerability that could be exploited for remote code execution (RCE).

Several solutions from Schneider Electric are plagued by a serious vulnerability that could be exploited for remote code execution (RCE).

Researcher Ariele Caltabiano identified a stack-based buffer overflow vulnerability in Schneider Electric’s SoMove Lite, a setup software for motor control devices. The energy management company has determined that the security hole actually affects a Device Type Manager (DTM) development kit distributed with several DTM libraries. The culprit is a DLL file installed via the DTM setup, Schneider Electric said.

According to security advisories published by ICS-CERT and Schneider Electric, the DLL is found in the Modbus Communication Library version 2.2.6 and earlier, the CANopen Communication Library version 1.0.2 and earlier, the EtherNet/IP Communication Library version 1.0.0 and earlier, EM X80 Gateway DTM (MB TCP/SL), Advantys DTMs (OTB, STB), KINOS DTM, SOLO DTM, and Xantrex DTMs.

The DTMs containing the vulnerable DLL are used in SoMove, SoMove Lite, Unity Pro and SoMachine. Unity Pro is a development software used to test, debug and manage applications, while SoMachine is a software environment for automation machinery.

“Successfully exploiting this vulnerability could allow a remote attacker to execute arbitrary code,” ICS- CERT said in its advisory.

The flaw has been assigned the CVE identifier CVE-2014-9200 and a CVSS base score of 7.5.

The vulnerability is not difficult to exploit, but fortunately there are no known exploits for it and Schneider Electric has developed a patch that substitutes the affected DLL.

This is the second security advisory published by Schneider Electric this year. Earlier this month, the company announced the availability of a firmware update that fixes a couple of critical bugs in ETG3000 FactoryCast HMI Gateway, a Web-based SCADA system.

DTM component vulnerabilities can be highly problematic. Alexander Bolshev and Gleb Cherbov, researchers at Russia-based Digital Security, have identified 32 vulnerable DTM components from a total of 24 vendors.

One of the flawed components is the CodeWrights HART DTM library, which is used in products developed by ABB, Berthold Technologies, Emerson, Endress+Hauser, Magnetrol, and Pepperl+Fuchs. CodeWrights has addressed the vulnerability and some of the affected companies have already started integrating the new version of the library in their solutions.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Vulnerabilities

Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.