Energy management giant Schneider Electric has patched a cross-site scripting (XSS) vulnerability on one of its websites.
Elastica researcher Aditya Sood, who recently disclosed the existence of vulnerabilities in the Supervisory Control and Data Acquisition (SCADA) products of several major vendors, reported identifying a reflected XSS flaw on Schneider Electric’s e-order.biz website.
E-order.biz is a site where users can order products from Schneider Electric Motion USA, a Schneider Electric subsidiary that designs, manufactures and supplies motors, drives, and controls used in areas such as robotics, medical instruments, semiconductor manufacturing, laboratory automation, packaging, and biomedical.
An advisory provided by Sood to SecurityWeek shows that the developers of the e-order website failed to sanitize the input passed by remote users in an HTTP request, allowing an attacker to execute arbitrary JavaScript code in the context of the web application.
According to the researcher, an attacker could have executed JavaScript code designed to steal cookies and session identifiers in an effort to hijack accounts. Malicious actors could have also leveraged the XSS vulnerability to take users to phishing sites or display phishing pages in an iframe within the legitimate website.
Sood noted that an attacker could have also forced users to download malicious code onto their computers.
Schneider Electric patched the XSS vulnerability on e-order.biz within a few weeks after it was reported by Sood. The company told the researcher that it has taken this opportunity to bring third-party service providers up to speed on secure development practices.
While this particular issue affected one of Schneider Electric’s websites, the company’s industrial control system (ICS) products are also often found to be plagued by vulnerabilities. A report released in September by threat intelligence firm Recorded Future showed that roughly 20 flaws affecting Schneider ICS products have been disclosed annually since 2011.
The Recorded Future report shows that Schneider and Siemens are the companies with the highest number of vulnerabilities disclosed each year, which is not surprising given the popularity of their products.
Schneider Electric is one of the ICS vendors whose products were analyzed earlier this year by Sood. Since the vulnerabilities were previously reported by a different researcher, Schneider managed to develop a patch within a month after Sood disclosed his findings at the DEF CON conference in Las Vegas.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions
- TikTok CEO Grilled by Skeptical Lawmakers on Safety, Content
- CISA, NSA Issue Guidance for IAM Administrators
- Analysis: SEC Cybersecurity Proposals and Biden’s National Cybersecurity Strategy
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
